All the vulnerabilites related to Huawei - HarmonyOS
var-202112-0348
Vulnerability from variot
There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37052" } ] }, "cve": "CVE-2021-37052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37052", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398885", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37052", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398885", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37052", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015860", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398885", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "id": "VAR-202112-0348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.365000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Exception\u00a0log\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173786" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.1 }, { "problemtype": "Improper handling in exceptional conditions (CWE-755) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-12-08T15:15:09.593000", "db": "NVD", "id": "CVE-2021-37052" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-12-09T17:53:01.237000", "db": "NVD", "id": "CVE-2021-37052" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to exceptional state handling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 } }
var-202212-0586
Vulnerability from variot
The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0586", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.0.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46314" } ] }, "cve": "CVE-2022-46314", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46314", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46314", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2501", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46314" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "VULHUB", "id": "VHN-444284" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46314", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023887", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2501", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444284", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444284" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "id": "VAR-202212-0586", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444284" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:08.367000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218954" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46314" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46314/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444284" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444284" }, { "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "db": "NVD", "id": "CVE-2022-46314" }, { "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444284" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "date": "2022-12-20T21:15:11.347000", "db": "NVD", "id": "CVE-2022-46314" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444284" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023887" }, { "date": "2022-12-24T04:14:59.490000", "db": "NVD", "id": "CVE-2022-46314" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2501" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2501" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2501" } ], "trust": 0.6 } }
var-202112-0224
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in Huawei HarmonyOS, which can be exploited by attackers to leak user privacy
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0224", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37096" } ] }, "cve": "CVE-2021-37096", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37096", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398932", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37096", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37096", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2055", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398932", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in Huawei HarmonyOS, which can be exploited by attackers to leak user privacy", "sources": [ { "db": "NVD", "id": "CVE-2021-37096" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "VULHUB", "id": "VHN-398932" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37096", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015894", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2055", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103535", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398932", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "id": "VAR-202112-0224", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398932" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:08.152000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173524" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37096" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398932" }, { "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "db": "NVD", "id": "CVE-2021-37096" }, { "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398932" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "date": "2021-12-07T17:15:09.897000", "db": "NVD", "id": "CVE-2021-37096" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398932" }, { "date": "2022-12-01T08:20:00", "db": "JVNDB", "id": "JVNDB-2021-015894" }, { "date": "2021-12-09T17:33:27.780000", "db": "NVD", "id": "CVE-2021-37096" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2055" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2055" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015894" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2055" } ], "trust": 0.6 } }
var-202110-1434
Vulnerability from variot
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1434", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22456" } ] }, "cve": "CVE-2021-22456", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22456", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380891", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22456", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22456", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2046", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380891", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22456" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "VULHUB", "id": "VHN-380891" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22456", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014463", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380891", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "id": "VAR-202110-1434", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380891" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:17.011000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171483" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22456" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380891" }, { "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "db": "NVD", "id": "CVE-2021-22456" }, { "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380891" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "date": "2021-10-28T13:15:09.067000", "db": "NVD", "id": "CVE-2021-22456" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380891" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014463" }, { "date": "2021-11-02T13:55:34.167000", "db": "NVD", "id": "CVE-2021-22456" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2046" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014463" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2046" } ], "trust": 0.6 } }
var-202110-1453
Vulnerability from variot
A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash. HarmonyOS Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22466" } ] }, "cve": "CVE-2021-22466", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22466", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380901", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22466", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22466", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2058", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380901", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash. HarmonyOS Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22466" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "VULHUB", "id": "VHN-380901" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22466", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014249", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2058", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380901", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "id": "VAR-202110-1453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380901" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:26.883000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171522" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22466" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380901" }, { "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "db": "NVD", "id": "CVE-2021-22466" }, { "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380901" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "date": "2021-10-28T13:15:09.493000", "db": "NVD", "id": "CVE-2021-22466" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380901" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014249" }, { "date": "2021-11-01T19:11:00.430000", "db": "NVD", "id": "CVE-2021-22466" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2058" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2058" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014249" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2058" } ], "trust": 0.6 } }
var-202111-0848
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0848", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37013" } ] }, "cve": "CVE-2021-37013", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37013", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398845", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37013", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37013", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1882", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398845", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37013" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "VULHUB", "id": "VHN-398845" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37013", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1882", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398845", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "id": "VAR-202111-0848", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398845" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:32.237000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172181" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37013" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398845" }, { "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "db": "NVD", "id": "CVE-2021-37013" }, { "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398845" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "date": "2021-11-23T16:15:09.200000", "db": "NVD", "id": "CVE-2021-37013" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398845" }, { "date": "2022-11-24T09:07:00", "db": "JVNDB", "id": "JVNDB-2021-015586" }, { "date": "2021-11-29T15:21:34.720000", "db": "NVD", "id": "CVE-2021-37013" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1882" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1882" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1882" } ], "trust": 0.6 } }
var-202110-1433
Vulnerability from variot
A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22458" } ] }, "cve": "CVE-2021-22458", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22458", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380893", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22458", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22458", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2049", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380893", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22458", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22458", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014464", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2049", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380893", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22458", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "id": "VAR-202110-1433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380893" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.356000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168390" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22458" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380893" }, { "db": "VULMON", "id": "CVE-2021-22458" }, { "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "db": "NVD", "id": "CVE-2021-22458" }, { "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380893" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22458" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "date": "2021-10-28T13:15:09.147000", "db": "NVD", "id": "CVE-2021-22458" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380893" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22458" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014464" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22458" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014464" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2049" } ], "trust": 0.6 } }
var-202204-1557
Vulnerability from variot
The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22257" } ] }, "cve": "CVE-2022-22257", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22257", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409786", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22257", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22257", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409786", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22257", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22257", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007943", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52825", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409786", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22257", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "id": "VAR-202204-1557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409786" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:10.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189780" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22257" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22257/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-11T20:15:19.703000", "db": "NVD", "id": "CVE-2022-22257" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-18T18:13:50.083000", "db": "NVD", "id": "CVE-2022-22257" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product permission management vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 } }
var-202112-0943
Vulnerability from variot
There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei.
A security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0943", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39998" } ] }, "cve": "CVE-2021-39998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39998", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-05169", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401399", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39998", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39998", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-05169", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401399", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei. \n\r\n\r\nA security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39998", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017518", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05169", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401399", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "id": "VAR-202112-0943", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" } ] }, "last_update_date": "2023-12-18T12:42:10.325000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Unknown vulnerability exists in Huawei HarmonyOS HwConnectivityExService service", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315101" }, { "title": "Huawei HarmonyOS and Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172739" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39998" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2022-01-10T14:10:20.877000", "db": "NVD", "id": "CVE-2021-39998" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T05:49:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2022-01-13T02:10:20.940000", "db": "NVD", "id": "CVE-2021-39998" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 } }
var-202201-1716
Vulnerability from variot
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product's camera component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1716", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40039" } ] }, "cve": "CVE-2021-40039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40039", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401440", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40039", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40039", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401440", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product\u0027s camera component", "sources": [ { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002911", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04996", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401440", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "id": "VAR-202201-1716", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:33.617000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177450" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-10T14:10:22.937000", "db": "NVD", "id": "CVE-2021-40039" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-13T15:37:04.397000", "db": "NVD", "id": "CVE-2021-40039" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 In the product \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 } }
var-202112-0223
Vulnerability from variot
There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file. HarmonyOS Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is China's Huawei ( Huawei ) company's operating system. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0223", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37099" } ] }, "cve": "CVE-2021-37099", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37099", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398935", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37099", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37099", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2025", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398935", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file. HarmonyOS Exists in a past traversal vulnerability.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is China\u0027s Huawei ( Huawei ) company\u0027s operating system. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37099" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "VULHUB", "id": "VHN-398935" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37099", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015880", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2025", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103534", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398935", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "id": "VAR-202112-0223", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398935" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.329000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173502" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37099" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398935" }, { "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "db": "NVD", "id": "CVE-2021-37099" }, { "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398935" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "date": "2021-12-07T17:15:09.937000", "db": "NVD", "id": "CVE-2021-37099" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398935" }, { "date": "2022-12-01T06:56:00", "db": "JVNDB", "id": "JVNDB-2021-015880" }, { "date": "2021-12-09T17:33:07.153000", "db": "NVD", "id": "CVE-2021-37099" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2025" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2025" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015880" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2025" } ], "trust": 0.6 } }
var-202210-0345
Vulnerability from variot
The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0345", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41578" } ] }, "cve": "CVE-2022-41578", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41578", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41578", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-175", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "VULHUB", "id": "VHN-437805" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41578", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018743", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-175", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437805", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "id": "VAR-202210-0345", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437805" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:47.001000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211156" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41578" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41578/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437805" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "date": "2022-10-14T16:15:21.030000", "db": "NVD", "id": "CVE-2022-41578" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437805" }, { "date": "2023-10-23T06:35:00", "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "date": "2022-10-18T14:49:46.290000", "db": "NVD", "id": "CVE-2022-41578" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ], "trust": 0.6 } }
var-202109-1956
Vulnerability from variot
The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage. HarmonyOS The module contains a usage of freed memory vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1956", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22478" } ] }, "cve": "CVE-2021-22478", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22478", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380913", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22478", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22478", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2065", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380913", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage. HarmonyOS The module contains a usage of freed memory vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22478" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "VULHUB", "id": "VHN-380913" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22478", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018624", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2065", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380913", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "id": "VAR-202109-1956", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380913" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:17.154000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171978" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22478" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22478/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380913" }, { "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "db": "NVD", "id": "CVE-2021-22478" }, { "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380913" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "date": "2022-02-25T19:15:10.910000", "db": "NVD", "id": "CVE-2021-22478" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380913" }, { "date": "2023-07-04T01:56:00", "db": "JVNDB", "id": "JVNDB-2021-018624" }, { "date": "2022-03-07T19:05:26.517000", "db": "NVD", "id": "CVE-2021-22478" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2065" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2065" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Module Use of Freed Memory Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018624" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2065" } ], "trust": 0.6 } }
var-202206-0262
Vulnerability from variot
AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31759" } ] }, "cve": "CVE-2022-31759", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31759", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423592", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31759", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31759", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423592", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31759", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011279", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66178", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423592", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "id": "VAR-202206-0262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423592" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:53.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196701" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-824", "trust": 1.1 }, { "problemtype": "Accessing uninitialized pointers (CWE-824) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31759" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31759/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-13T15:15:10.337000", "db": "NVD", "id": "CVE-2022-31759" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-18T03:09:08.127000", "db": "NVD", "id": "CVE-2022-31759" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Uninitialized Pointer Access Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 } }
var-202201-1023
Vulnerability from variot
The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1023", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40022" } ] }, "cve": "CVE-2021-40022", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40022", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401423", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40022", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40022", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-302", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401423", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" }, { "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40022" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "VULHUB", "id": "VHN-401423" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40022", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002901", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-302", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-08459", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401423", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" }, { "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "id": "VAR-202201-1023", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401423" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:07.942000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178004" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40022" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" }, { "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401423" }, { "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "db": "NVD", "id": "CVE-2021-40022" }, { "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401423" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "date": "2022-01-10T14:10:21.653000", "db": "NVD", "id": "CVE-2021-40022" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401423" }, { "date": "2023-01-25T08:50:00", "db": "JVNDB", "id": "JVNDB-2022-002901" }, { "date": "2022-01-13T03:17:45.520000", "db": "NVD", "id": "CVE-2021-40022" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-302" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-302" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002901" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-302" } ], "trust": 0.6 } }
var-202106-1796
Vulnerability from variot
A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have a security flaw that stems from incorrect permission assignments. This vulnerability could affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1796", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22326" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22326" } ] }, "cve": "CVE-2021-22326", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 9.2, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380761", "impactScore": 9.2, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22326", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22326", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1981", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380761", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22326", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "NVD", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have a security flaw that stems from incorrect permission assignments. This vulnerability could affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-22326" }, { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22326", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1981", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380761", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22326", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "NVD", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "id": "VAR-202106-1796", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380761" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:41.171000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156065" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "NVD", "id": "CVE-2021-22326" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "NVD", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380761" }, { "db": "VULMON", "id": "CVE-2021-22326" }, { "db": "NVD", "id": "CVE-2021-22326" }, { "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380761" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22326" }, { "date": "2021-06-30T14:15:08.563000", "db": "NVD", "id": "CVE-2021-22326" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380761" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22326" }, { "date": "2021-11-02T19:19:27.707000", "db": "NVD", "id": "CVE-2021-22326" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1981" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1981" } ], "trust": 0.6 } }
var-202112-0344
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37074" } ] }, "cve": "CVE-2021-37074", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37074", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-398908", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37074", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37074", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398908", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37074", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015864", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398908", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "id": "VAR-202112-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:58.499000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37074" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-12-08T15:15:09.807000", "db": "NVD", "id": "CVE-2021-37074" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-12-09T17:55:40.317000", "db": "NVD", "id": "CVE-2021-37074" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 } }
var-202107-1679
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1679", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22426" } ] }, "cve": "CVE-2021-22426", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22426", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380861", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22426", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22426", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380861", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22426", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380861", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "id": "VAR-202107-1679", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:30.920000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202107-0000001170634565 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172003" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22426" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22426/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2022-02-25T19:15:09.207000", "db": "NVD", "id": "CVE-2021-22426" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T08:24:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2022-03-07T17:50:39.693000", "db": "NVD", "id": "CVE-2021-22426" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 } }
var-202112-0233
Vulnerability from variot
There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0233", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37083" } ] }, "cve": "CVE-2021-37083", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37083", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398918", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37083", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37083", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2007", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398918", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37083" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "VULHUB", "id": "VHN-398918" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37083", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015945", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2007", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01677", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398918", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "id": "VAR-202112-0233", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398918" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:54Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173486" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37083" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398918" }, { "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "db": "NVD", "id": "CVE-2021-37083" }, { "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398918" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "date": "2021-12-07T17:15:09.437000", "db": "NVD", "id": "CVE-2021-37083" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398918" }, { "date": "2022-12-05T01:40:00", "db": "JVNDB", "id": "JVNDB-2021-015945" }, { "date": "2021-12-09T17:34:59.787000", "db": "NVD", "id": "CVE-2021-37083" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2007" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 in smartphone \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015945" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2007" } ], "trust": 0.6 } }
var-202204-1427
Vulnerability from variot
The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1427", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46742" } ] }, "cve": "CVE-2021-46742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46742", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418651", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46742", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46742", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-418651", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device", "sources": [ { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44618", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418651", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "id": "VAR-202204-1427", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418651" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:09.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189573" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46742" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46742/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-04-11T20:15:16.397000", "db": "NVD", "id": "CVE-2021-46742" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-46742" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 } }
var-202110-1855
Vulnerability from variot
Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1855", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39971" } ] }, "cve": "CVE-2021-39971", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39971", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401372", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39971", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39971", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2226", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401372", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39971", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017610", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2226", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401372", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39971", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "id": "VAR-202110-1855", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401372" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:49.843000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176774" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.0 }, { "problemtype": "Externally controllable reference to another region resource (CWE-610) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-610", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39971" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401372" }, { "db": "VULMON", "id": "CVE-2021-39971" }, { "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "db": "NVD", "id": "CVE-2021-39971" }, { "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401372" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39971" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "date": "2022-01-03T22:15:10.190000", "db": "NVD", "id": "CVE-2021-39971" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401372" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39971" }, { "date": "2023-01-27T07:07:00", "db": "JVNDB", "id": "JVNDB-2021-017610" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-39971" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2226" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in externally controllable references to resources in another region of", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017610" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2226" } ], "trust": 0.6 } }
var-202112-0234
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0234", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37082" } ] }, "cve": "CVE-2021-37082", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37082", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398917", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37082", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37082", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2058", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398917", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37082" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "VULHUB", "id": "VHN-398917" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37082", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015947", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2058", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01678", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398917", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "id": "VAR-202112-0234", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398917" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:10.572000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173526" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37082" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398917" }, { "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "db": "NVD", "id": "CVE-2021-37082" }, { "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398917" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "date": "2021-12-07T17:15:09.393000", "db": "NVD", "id": "CVE-2021-37082" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398917" }, { "date": "2022-12-05T01:44:00", "db": "JVNDB", "id": "JVNDB-2021-015947" }, { "date": "2021-12-09T17:35:11.540000", "db": "NVD", "id": "CVE-2021-37082" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2058" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2058" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015947" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2058" } ], "trust": 0.6 } }
var-202112-0949
Vulnerability from variot
Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality. HarmonyOS Exists in the use of cryptographic algorithms.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0949", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40006" } ] }, "cve": "CVE-2021-40006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40006", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2022-05175", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401407", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.6, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40006", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-05175", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202112-209", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401407", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" }, { "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality. HarmonyOS Exists in the use of cryptographic algorithms.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40006" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40006", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017515", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05175", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-209", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401407", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" }, { "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "id": "VAR-202112-0949", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" } ] }, "last_update_date": "2023-12-18T13:46:53.311000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Encryption Issue Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315076" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172733" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-327", "trust": 1.1 }, { "problemtype": "Use of incomplete or dangerous cryptographic algorithms (CWE-327) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40006" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" }, { "trust": 1.0, "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "trust": 1.0, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" }, { "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05175" }, { "db": "VULHUB", "id": "VHN-401407" }, { "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "db": "NVD", "id": "CVE-2021-40006" }, { "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05175" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401407" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "date": "2022-01-10T14:10:21.260000", "db": "NVD", "id": "CVE-2021-40006" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05175" }, { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401407" }, { "date": "2023-01-24T05:25:00", "db": "JVNDB", "id": "JVNDB-2021-017515" }, { "date": "2023-08-13T13:15:08.720000", "db": "NVD", "id": "CVE-2021-40006" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-209" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in using cryptographic algorithms in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017515" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-209" } ], "trust": 0.6 } }
var-202211-0397
Vulnerability from variot
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0397", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44559" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44559" } ] }, "cve": "CVE-2022-44559", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44559", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2124", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "VULHUB", "id": "VHN-441949" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44559", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2124", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441949", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "id": "VAR-202211-0397", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441949" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:27.224000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214354" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44559" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44559/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441949" }, { "date": "2022-11-09T21:15:18.727000", "db": "NVD", "id": "CVE-2022-44559" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441949" }, { "date": "2022-11-14T19:09:05.380000", "db": "NVD", "id": "CVE-2022-44559" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 } }
var-202112-0327
Vulnerability from variot
There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37075" } ] }, "cve": "CVE-2021-37075", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37075", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398909", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37075", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37075", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398909", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37075", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015865", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398909", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "id": "VAR-202112-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.388000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Credential\u00a0management\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173804" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37075" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2021-12-08T15:15:09.867000", "db": "NVD", "id": "CVE-2021-37075" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37075" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 } }
var-202107-1677
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1677", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22429" } ] }, "cve": "CVE-2021-22429", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22429", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380864", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22429", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22429", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380864", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)", "sources": [ { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22429", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018746", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380864", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22429", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "id": "VAR-202107-1677", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380864" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:32.961000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172015" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22429" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22429/" }, { "trust": 0.1, "url": "https://labs.taszk.io/blog/post/bootrom_usb/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2022-02-25T19:15:09.387000", "db": "NVD", "id": "CVE-2021-22429" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T01:52:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2022-03-07T17:54:50.527000", "db": "NVD", "id": "CVE-2021-22429" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 } }
var-202110-1431
Vulnerability from variot
A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1431", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22460" } ] }, "cve": "CVE-2021-22460", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22460", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380895", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22460", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22460", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2052", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380895", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism", "sources": [ { "db": "NVD", "id": "CVE-2021-22460" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "VULHUB", "id": "VHN-380895" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22460", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014466", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2052", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380895", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "id": "VAR-202110-1431", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380895" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.382000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171504" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22460" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380895" }, { "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "db": "NVD", "id": "CVE-2021-22460" }, { "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380895" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "date": "2021-10-28T13:15:09.230000", "db": "NVD", "id": "CVE-2021-22460" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380895" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014466" }, { "date": "2021-11-02T12:57:36.433000", "db": "NVD", "id": "CVE-2021-22460" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2052" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Inadequate validation of data reliability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014466" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2052" } ], "trust": 0.6 } }
var-202207-0180
Vulnerability from variot
The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0180", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34738" } ] }, "cve": "CVE-2022-34738", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34738", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427080", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34738", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34738", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427080", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34738", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34738", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013202", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52820", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427080", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34738", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "id": "VAR-202207-0180", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427080" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:57.855000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199750" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34738" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34738/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-12T14:15:19.377000", "db": "NVD", "id": "CVE-2022-34738" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-19T12:42:40.837000", "db": "NVD", "id": "CVE-2022-34738" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 } }
var-202208-0784
Vulnerability from variot
The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0784", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37004" } ] }, "cve": "CVE-2022-37004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37004", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37004", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014552", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "id": "VAR-202208-0784", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:23.550000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204368" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37004" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37004/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-10T20:16:04.263000", "db": "NVD", "id": "CVE-2022-37004" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-15T18:00:46.777000", "db": "NVD", "id": "CVE-2022-37004" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 } }
var-202111-1774
Vulnerability from variot
The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1774", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39987" } ] }, "cve": "CVE-2021-39987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39987", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401388", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39987", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2126", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401388", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39987", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017727", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2126", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08312", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401388", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39987", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "id": "VAR-202111-1774", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401388" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:31.079000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39987" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401388" }, { "db": "VULMON", "id": "CVE-2021-39987" }, { "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "db": "NVD", "id": "CVE-2021-39987" }, { "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401388" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39987" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "date": "2022-01-03T22:15:10.890000", "db": "NVD", "id": "CVE-2021-39987" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401388" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39987" }, { "date": "2023-02-02T02:30:00", "db": "JVNDB", "id": "JVNDB-2021-017727" }, { "date": "2022-01-14T15:51:23.237000", "db": "NVD", "id": "CVE-2021-39987" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2126" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding mix-ups in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017727" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2126" } ], "trust": 0.6 } }
var-202201-1730
Vulnerability from variot
The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1730", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40014" } ] }, "cve": "CVE-2021-40014", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40014", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401415", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40014", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40014", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-273", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401415", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" }, { "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2021-40014" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "VULHUB", "id": "VHN-401415" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40014", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002888", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-273", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08452", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401415", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" }, { "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "id": "VAR-202201-1730", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401415" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:40.810000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=177993" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "trust": 1.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40014" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" }, { "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401415" }, { "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "db": "NVD", "id": "CVE-2021-40014" }, { "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401415" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "date": "2022-01-10T14:10:21.463000", "db": "NVD", "id": "CVE-2021-40014" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401415" }, { "date": "2023-01-24T03:18:00", "db": "JVNDB", "id": "JVNDB-2022-002888" }, { "date": "2023-07-06T14:15:10.297000", "db": "NVD", "id": "CVE-2021-40014" }, { "date": "2023-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-273" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-273" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002888" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-273" } ], "trust": 0.6 } }
var-202111-1782
Vulnerability from variot
The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1782", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39988" } ] }, "cve": "CVE-2021-39988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39988", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401389", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39988", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39988", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2124", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401389", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39988", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017726", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2124", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08311", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401389", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39988", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "id": "VAR-202111-1782", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401389" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:10.727000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176785" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39988" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401389" }, { "db": "VULMON", "id": "CVE-2021-39988" }, { "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "db": "NVD", "id": "CVE-2021-39988" }, { "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401389" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39988" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "date": "2022-01-03T22:15:10.937000", "db": "NVD", "id": "CVE-2021-39988" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401389" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39988" }, { "date": "2023-02-02T02:27:00", "db": "JVNDB", "id": "JVNDB-2021-017726" }, { "date": "2022-01-14T15:56:02.800000", "db": "NVD", "id": "CVE-2021-39988" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2124" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017726" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2124" } ], "trust": 0.6 } }
var-202201-1719
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1719", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40029" } ] }, "cve": "CVE-2021-40029", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40029", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401430", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40029", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40029", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401430", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40029", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002897", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04995", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401430", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "id": "VAR-202201-1719", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:18.632000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177999" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40029" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-10T14:10:21.920000", "db": "NVD", "id": "CVE-2021-40029" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-13T14:34:52.030000", "db": "NVD", "id": "CVE-2021-40029" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 } }
var-202208-0507
Vulnerability from variot
The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0507", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37008" } ] }, "cve": "CVE-2022-37008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37008", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37008", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37008", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014548", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427493", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "id": "VAR-202208-0507", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:24.099000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204370" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37008" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37008/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-10T20:16:04.967000", "db": "NVD", "id": "CVE-2022-37008" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-15T17:58:26.997000", "db": "NVD", "id": "CVE-2022-37008" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Insufficient Validation of Data Trust in Products Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 } }
var-202108-0280
Vulnerability from variot
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. HarmonyOS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0280", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22416" } ] }, "cve": "CVE-2021-22416", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22416", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380851", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22416", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22416", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-315", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380851", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22416", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" }, { "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. HarmonyOS Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22416", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009381", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-315", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380851", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22416", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" }, { "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "id": "VAR-202108-0280", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380851" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:09.610000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159646" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22416" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" }, { "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380851" }, { "db": "VULMON", "id": "CVE-2021-22416" }, { "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "db": "NVD", "id": "CVE-2021-22416" }, { "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380851" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22416" }, { "date": "2022-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "date": "2021-08-03T18:15:07.973000", "db": "NVD", "id": "CVE-2021-22416" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380851" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22416" }, { "date": "2022-04-22T07:25:00", "db": "JVNDB", "id": "JVNDB-2021-009381" }, { "date": "2021-08-11T13:17:52.347000", "db": "NVD", "id": "CVE-2021-22416" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-315" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-315" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009381" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-315" } ], "trust": 0.6 } }
var-202110-1851
Vulnerability from variot
There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1851", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37110" } ] }, "cve": "CVE-2021-37110", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37110", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398946", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37110", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37110", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398946", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37110", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398946", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37110", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "id": "VAR-202110-1851", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398946" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.373000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176778" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37110" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2022-01-03T22:15:09", "db": "NVD", "id": "CVE-2021-37110" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T07:06:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2022-01-11T19:27:32.067000", "db": "NVD", "id": "CVE-2021-37110" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 } }
var-202204-0765
Vulnerability from variot
The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0765", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46740" } ] }, "cve": "CVE-2021-46740", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46740", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-418649", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46740", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46740", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2012", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418649", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46740", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device", "sources": [ { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46740", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007972", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2012", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44619", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418649", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46740", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "id": "VAR-202204-0765", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418649" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:01.061000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189571" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46740" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46740/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-418649" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-46740" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "date": "2022-04-11T20:15:16.350000", "db": "NVD", "id": "CVE-2021-46740" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-15T00:00:00", "db": "VULHUB", "id": "VHN-418649" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-46740" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "date": "2022-04-15T20:06:33.793000", "db": "NVD", "id": "CVE-2021-46740" }, { "date": "2022-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007972" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ], "trust": 0.6 } }
var-202110-1459
Vulnerability from variot
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1459", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22454" } ] }, "cve": "CVE-2021-22454", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22454", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380889", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22454", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22454", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2044", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380889", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22454" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "VULHUB", "id": "VHN-380889" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22454", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014242", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2044", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380889", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "id": "VAR-202110-1459", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380889" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.860000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171470" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-674", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22454" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380889" }, { "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "db": "NVD", "id": "CVE-2021-22454" }, { "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380889" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "date": "2021-10-28T13:15:08.987000", "db": "NVD", "id": "CVE-2021-22454" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380889" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014242" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22454" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014242" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2044" } ], "trust": 0.6 } }
var-202204-1291
Vulnerability from variot
A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22254" } ] }, "cve": "CVE-2022-22254", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22254", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409783", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22254", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22254", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409783", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22254", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22254", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008144", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44622", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409783", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "id": "VAR-202204-1291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409783" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:57:52.130000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=190070" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Illegal authentication (CWE-863) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22254" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22254/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2022-04-11T20:15:19.567000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2023-08-08T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Fraudulent Authentication Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 } }
var-202110-1450
Vulnerability from variot
A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1450", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22469" } ] }, "cve": "CVE-2021-22469", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22469", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380904", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22469", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22469", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380904", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read. HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22469" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "VULHUB", "id": "VHN-380904" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22469", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014252", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2062", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380904", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "id": "VAR-202110-1450", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380904" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:25.270000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171537" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22469" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380904" }, { "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "db": "NVD", "id": "CVE-2021-22469" }, { "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380904" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "date": "2021-10-28T13:15:09.620000", "db": "NVD", "id": "CVE-2021-22469" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380904" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014252" }, { "date": "2021-11-01T19:34:33.347000", "db": "NVD", "id": "CVE-2021-22469" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2062" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014252" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2062" } ], "trust": 0.6 } }
var-202205-0302
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0302", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29795" } ] }, "cve": "CVE-2022-29795", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29795", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421304", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29795", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29795", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2553", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421304", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29795", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009626", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2553", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47651", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421304", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29795", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "id": "VAR-202205-0302", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421304" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:49.443000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193774" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29795" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29795/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421304" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29795" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "date": "2022-05-13T15:15:10.033000", "db": "NVD", "id": "CVE-2022-29795" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421304" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29795" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "date": "2022-05-23T18:39:58.577000", "db": "NVD", "id": "CVE-2022-29795" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009626" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ], "trust": 0.6 } }
var-202206-0119
Vulnerability from variot
The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0119", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31756" } ] }, "cve": "CVE-2022-31756", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31756", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423589", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31756", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31756", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423589", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31756", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31756", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011280", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66180", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423589", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31756", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "id": "VAR-202206-0119", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423589" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:39.501000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195991" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31756" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31756/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-13T15:15:10.150000", "db": "NVD", "id": "CVE-2022-31756" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-18T03:07:52.780000", "db": "NVD", "id": "CVE-2022-31756" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 } }
var-202203-0269
Vulnerability from variot
There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0269", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40063" } ] }, "cve": "CVE-2021-40063", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40063", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401464", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40063", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40063", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401464", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40063", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018701", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401464", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "id": "VAR-202203-0269", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:13.670000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185886" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40063" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40063/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-10T17:43:24.527000", "db": "NVD", "id": "CVE-2021-40063" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-14T16:17:53.347000", "db": "NVD", "id": "CVE-2021-40063" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 } }
var-202110-1451
Vulnerability from variot
A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1451", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22468" } ] }, "cve": "CVE-2021-22468", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22468", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380903", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22468", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22468", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202110-2061", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380903", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22468" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "VULHUB", "id": "VHN-380903" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22468", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014251", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2061", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380903", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "id": "VAR-202110-1451", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380903" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:32.879000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171532" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22468" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380903" }, { "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "db": "NVD", "id": "CVE-2021-22468" }, { "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380903" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "date": "2021-10-28T13:15:09.577000", "db": "NVD", "id": "CVE-2021-22468" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380903" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014251" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22468" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2061" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2061" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014251" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2061" } ], "trust": 0.6 } }
var-202111-1768
Vulnerability from variot
There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39973" } ] }, "cve": "CVE-2021-39973", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39973", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401374", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39973", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39973", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401374", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39973", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017607", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39973", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "id": "VAR-202111-1768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401374" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:39.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39973" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2022-01-03T22:15:10.283000", "db": "NVD", "id": "CVE-2021-39973" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T06:59:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2022-01-13T15:52:06.580000", "db": "NVD", "id": "CVE-2021-39973" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 in smartphone products \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 } }
var-202301-0683
Vulnerability from variot
The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0683", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-47976" } ] }, "cve": "CVE-2022-47976", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47976", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-47976", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-434", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47976", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001766", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-434", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449904", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47976", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "id": "VAR-202301-0683", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449904" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:04.345000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221311" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47976" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47976/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449904" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47976" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "date": "2023-01-06T20:15:09.937000", "db": "NVD", "id": "CVE-2022-47976" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449904" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47976" }, { "date": "2023-05-09T01:29:00", "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "date": "2023-01-12T15:57:52.347000", "db": "NVD", "id": "CVE-2022-47976" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-434" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-434" } ], "trust": 0.6 } }
var-202208-0562
Vulnerability from variot
The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0562", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37007" } ] }, "cve": "CVE-2022-37007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37007", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37007", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37007", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014549", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "id": "VAR-202208-0562", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:45.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204372" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37007" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37007/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-10T20:16:04.797000", "db": "NVD", "id": "CVE-2022-37007" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-15T17:59:09.927000", "db": "NVD", "id": "CVE-2022-37007" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 } }
var-202110-1848
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1848", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37117" } ] }, "cve": "CVE-2021-37117", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37117", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398953", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37117", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37117", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398953", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37117", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04710", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398953", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37117", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "id": "VAR-202110-1848", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398953" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:23.733000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176781" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37117" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2022-01-03T22:15:09.347000", "db": "NVD", "id": "CVE-2021-37117" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T06:27:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2022-01-11T19:46:26.163000", "db": "NVD", "id": "CVE-2021-37117" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 } }
var-202111-0847
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0847", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37015" } ] }, "cve": "CVE-2021-37015", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37015", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398847", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37015", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37015", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1883", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398847", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37015" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "VULHUB", "id": "VHN-398847" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37015", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015584", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1883", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398847", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "id": "VAR-202111-0847", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398847" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:10.659000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172182" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37015" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398847" }, { "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "db": "NVD", "id": "CVE-2021-37015" }, { "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398847" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "date": "2021-11-23T16:15:09.240000", "db": "NVD", "id": "CVE-2021-37015" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398847" }, { "date": "2022-11-24T09:03:00", "db": "JVNDB", "id": "JVNDB-2021-015584" }, { "date": "2021-11-29T15:21:49.657000", "db": "NVD", "id": "CVE-2021-37015" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1883" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1883" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1883" } ], "trust": 0.6 } }
var-202204-1425
Vulnerability from variot
The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure to properly process the input error message, and an attacker can exploit this vulnerability to cause a denial of service for the application
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1425", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22255" } ] }, "cve": "CVE-2022-22255", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22255", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409784", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22255", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22255", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2035", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409784", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22255", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure to properly process the input error message, and an attacker can exploit this vulnerability to cause a denial of service for the application", "sources": [ { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22255", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007944", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2035", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44620", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409784", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22255", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "id": "VAR-202204-1425", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409784" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:43.527000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189782" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22255" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22255/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409784" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22255" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "date": "2022-04-11T20:15:19.613000", "db": "NVD", "id": "CVE-2022-22255" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409784" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22255" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "date": "2022-04-18T20:56:42.180000", "db": "NVD", "id": "CVE-2022-22255" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ], "trust": 0.6 } }
var-202211-0417
Vulnerability from variot
The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0417", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "cve": "CVE-2022-44557", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44557", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2129", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "VULHUB", "id": "VHN-441945" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44557", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2129", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441945", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "id": "VAR-202211-0417", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441945" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:46.775000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214356" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44557" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44557/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441945" }, { "date": "2022-11-09T21:15:18.617000", "db": "NVD", "id": "CVE-2022-44557" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441945" }, { "date": "2022-11-14T19:10:30.747000", "db": "NVD", "id": "CVE-2022-44557" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 } }
var-202112-0238
Vulnerability from variot
There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0238", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37097" } ] }, "cve": "CVE-2021-37097", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37097", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398933", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37097", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37097", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398933", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37097", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015868", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398933", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "id": "VAR-202112-0238", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:21.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "OOM\u00a0vulnerability\u00a0with\u00a0the\u00a0system\u00a0framework\u00a0code\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173805" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37097" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-12-08T15:15:10.023000", "db": "NVD", "id": "CVE-2021-37097" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-15T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-12-15T13:47:44.103000", "db": "NVD", "id": "CVE-2021-37097" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 } }
var-202108-0275
Vulnerability from variot
A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler. HarmonyOS Is vulnerable to incorrect default permissions.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0275", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22295" } ] }, "cve": "CVE-2021-22295", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22295", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380730", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22295", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22295", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-655", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380730", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22295", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" }, { "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler. HarmonyOS Is vulnerable to incorrect default permissions.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22295", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009621", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-655", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380730", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" }, { "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "id": "VAR-202108-0275", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380730" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:32.752000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://device.harmonyos.com/" }, { "title": "HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=158952" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pagesize=10\u0026pageindex=1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22295" }, { "trust": 0.1, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026amp;pagesize=10\u0026amp;pageindex=1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" }, { "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380730" }, { "db": "VULMON", "id": "CVE-2021-22295" }, { "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "db": "NVD", "id": "CVE-2021-22295" }, { "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-06T00:00:00", "db": "VULHUB", "id": "VHN-380730" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22295" }, { "date": "2022-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "date": "2021-08-06T13:15:07.247000", "db": "NVD", "id": "CVE-2021-22295" }, { "date": "2021-08-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-13T00:00:00", "db": "VULHUB", "id": "VHN-380730" }, { "date": "2021-08-13T00:00:00", "db": "VULMON", "id": "CVE-2021-22295" }, { "date": "2022-05-13T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-009621" }, { "date": "2021-08-13T12:42:34.613000", "db": "NVD", "id": "CVE-2021-22295" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-655" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-655" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Inappropriate Default Permission Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009621" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-655" } ], "trust": 0.6 } }
var-202211-0874
Vulnerability from variot
The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0874", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44561" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44561" } ] }, "cve": "CVE-2022-44561", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44561", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2467", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction", "sources": [ { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "VULHUB", "id": "VHN-441951" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44561", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2467", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441951", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "id": "VAR-202211-0874", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441951" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:27.769000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214623" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44561/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441951" }, { "date": "2022-11-09T21:15:18.863000", "db": "NVD", "id": "CVE-2022-44561" }, { "date": "2022-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-17T00:00:00", "db": "VULHUB", "id": "VHN-441951" }, { "date": "2022-11-17T22:20:06.457000", "db": "NVD", "id": "CVE-2022-44561" }, { "date": "2022-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 } }
var-202112-0353
Vulnerability from variot
There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0353", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37044" } ] }, "cve": "CVE-2021-37044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37044", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398877", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37044", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37044", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398877", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37044", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015892", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398877", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "id": "VAR-202112-0353", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Permission\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173801" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37044" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-12-08T15:15:09.323000", "db": "NVD", "id": "CVE-2021-37044" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-12-09T17:56:42.897000", "db": "NVD", "id": "CVE-2021-37044" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 } }
var-202112-0343
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0343", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37092" } ] }, "cve": "CVE-2021-37092", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37092", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398928", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37092", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37092", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398928", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37092", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015866", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08328", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398928", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "id": "VAR-202112-0343", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.189000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Memory\u00a0leakage\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37092" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-12-08T15:15:09.920000", "db": "NVD", "id": "CVE-2021-37092" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-12-09T17:59:00.210000", "db": "NVD", "id": "CVE-2021-37092" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 } }
var-202112-0243
Vulnerability from variot
There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash. Huawei Smartphones have a double free vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0243", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37072" } ] }, "cve": "CVE-2021-37072", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37072", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398906", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37072", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37072", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2043", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398906", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash. Huawei Smartphones have a double free vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37072" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "VULHUB", "id": "VHN-398906" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37072", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015961", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2043", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398906", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "id": "VAR-202112-0243", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398906" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.439000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173517" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37072" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398906" }, { "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "db": "NVD", "id": "CVE-2021-37072" }, { "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398906" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "date": "2021-12-07T17:15:09.050000", "db": "NVD", "id": "CVE-2021-37072" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-15T00:00:00", "db": "VULHUB", "id": "VHN-398906" }, { "date": "2022-12-05T02:46:00", "db": "JVNDB", "id": "JVNDB-2021-015961" }, { "date": "2021-12-15T13:42:55.633000", "db": "NVD", "id": "CVE-2021-37072" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2043" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2043" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Double free vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015961" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2043" } ], "trust": 0.6 } }
var-202103-0511
Vulnerability from variot
A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0511", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22294" } ] }, "cve": "CVE-2021-22294", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22294", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380729", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22294", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22294", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202103-217", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380729", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" }, { "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-22294" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "VULHUB", "id": "VHN-380729" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22294", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2021-003927", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202103-217", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380729", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" }, { "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "id": "VAR-202103-0511", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380729" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:59.409000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://device.harmonyos.com/" }, { "title": "HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=143468" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22294" }, { "trust": 0.8, "url": "https://gitee.com/openharmony/distributedschedule_samgr_lite/pulls/7/files" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" }, { "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380729" }, { "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "db": "NVD", "id": "CVE-2021-22294" }, { "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-02T00:00:00", "db": "VULHUB", "id": "VHN-380729" }, { "date": "2021-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "date": "2021-03-02T19:15:13.083000", "db": "NVD", "id": "CVE-2021-22294" }, { "date": "2021-03-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-09T00:00:00", "db": "VULHUB", "id": "VHN-380729" }, { "date": "2021-11-10T06:38:00", "db": "JVNDB", "id": "JVNDB-2021-003927" }, { "date": "2021-03-09T14:18:35.027000", "db": "NVD", "id": "CVE-2021-22294" }, { "date": "2021-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-217" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-217" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003927" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-217" } ], "trust": 0.6 } }
var-202107-1678
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1678", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22432" } ] }, "cve": "CVE-2021-22432", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22432", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380867", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22432", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22432", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380867", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22432", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22432", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018743", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380867", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22432", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "id": "VAR-202107-1678", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380867" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T23:03:43.314000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172010" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22432" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22432/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-02-25T19:15:10.007000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T01:42:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-03-07T17:58:26.287000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 } }
var-202107-1683
Vulnerability from variot
There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1683", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22434" } ] }, "cve": "CVE-2021-22434", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22434", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380869", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22434", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22434", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380869", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22434", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22434", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018741", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380869", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22434", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "id": "VAR-202107-1683", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380869" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T22:56:28.352000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171984" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22434" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22434/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-02-25T19:15:10.317000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T01:37:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-03-07T18:46:17.363000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 } }
var-202108-0282
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0282", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22418" } ] }, "cve": "CVE-2021-22418", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22418", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380853", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22418", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22418", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-324", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380853", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22418", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" }, { "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22418", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-324", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380853", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22418", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" }, { "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "id": "VAR-202108-0282", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380853" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:50.043000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159653" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22418" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" }, { "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380853" }, { "db": "VULMON", "id": "CVE-2021-22418" }, { "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "db": "NVD", "id": "CVE-2021-22418" }, { "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380853" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22418" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "date": "2021-08-03T18:15:08.050000", "db": "NVD", "id": "CVE-2021-22418" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380853" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22418" }, { "date": "2022-04-21T09:02:00", "db": "JVNDB", "id": "JVNDB-2021-009372" }, { "date": "2021-08-11T13:25:01.420000", "db": "NVD", "id": "CVE-2021-22418" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-324" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-324" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-324" } ], "trust": 0.6 } }
var-202112-0256
Vulnerability from variot
There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone. Huawei Smartphones contain an array index validation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37057" } ] }, "cve": "CVE-2021-37057", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37057", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398890", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37057", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37057", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2045", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398890", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone. Huawei Smartphones contain an array index validation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37057" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "VULHUB", "id": "VHN-398890" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37057", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015756", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2045", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398890", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "id": "VAR-202112-0256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398890" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:17.339000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173230" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37057" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398890" }, { "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "db": "NVD", "id": "CVE-2021-37057" }, { "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398890" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "date": "2021-12-07T17:15:08.467000", "db": "NVD", "id": "CVE-2021-37057" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398890" }, { "date": "2022-11-30T01:24:00", "db": "JVNDB", "id": "JVNDB-2021-015756" }, { "date": "2021-12-09T17:40:58.033000", "db": "NVD", "id": "CVE-2021-37057" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2045" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to array index validation in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015756" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2045" } ], "trust": 0.6 } }
var-202210-0254
Vulnerability from variot
The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38977" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38977" } ] }, "cve": "CVE-2022-38977", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38977", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-149", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38977" }, { "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data", "sources": [ { "db": "NVD", "id": "CVE-2022-38977" }, { "db": "VULHUB", "id": "VHN-434757" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38977", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-149", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "NVD", "id": "CVE-2022-38977" }, { "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "id": "VAR-202210-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434757" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:39.859000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211145" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "NVD", "id": "CVE-2022-38977" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38977/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "NVD", "id": "CVE-2022-38977" }, { "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434757" }, { "db": "NVD", "id": "CVE-2022-38977" }, { "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434757" }, { "date": "2022-10-14T16:15:13.017000", "db": "NVD", "id": "CVE-2022-38977" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434757" }, { "date": "2022-10-18T15:39:19.930000", "db": "NVD", "id": "CVE-2022-38977" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-149" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-149" } ], "trust": 0.6 } }
var-202112-0347
Vulnerability from variot
There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37053" } ] }, "cve": "CVE-2021-37053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37053", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398886", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37053", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37053", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398886", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015861", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398886", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "id": "VAR-202112-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.228000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173799" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-12-08T15:15:09.647000", "db": "NVD", "id": "CVE-2021-37053" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-12-09T17:55:28.810000", "db": "NVD", "id": "CVE-2021-37053" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 } }
var-202108-2286
Vulnerability from variot
There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2286", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22394" } ] }, "cve": "CVE-2021-22394", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22394", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380829", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22394", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22394", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380829", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22394", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "id": "VAR-202108-2286", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.437000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172031" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22394" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22394/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2022-02-25T19:15:08.927000", "db": "NVD", "id": "CVE-2021-22394" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2022-03-07T17:39:01.157000", "db": "NVD", "id": "CVE-2021-22394" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 } }
var-202112-0253
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage. Huawei Smartphones contain a vulnerability related to input validation.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37060" } ] }, "cve": "CVE-2021-37060", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37060", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398894", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37060", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37060", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2063", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398894", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage. Huawei Smartphones contain a vulnerability related to input validation.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37060" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "VULHUB", "id": "VHN-398894" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37060", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016046", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2063", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398894", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "id": "VAR-202112-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398894" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:30.844000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173529" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37060" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398894" }, { "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "db": "NVD", "id": "CVE-2021-37060" }, { "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398894" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "date": "2021-12-07T17:15:08.593000", "db": "NVD", "id": "CVE-2021-37060" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398894" }, { "date": "2022-12-05T07:36:00", "db": "JVNDB", "id": "JVNDB-2021-016046" }, { "date": "2021-12-09T17:40:14.807000", "db": "NVD", "id": "CVE-2021-37060" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2063" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2063" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016046" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2063" } ], "trust": 0.6 } }
var-202112-0239
Vulnerability from variot
There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0239", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37078" } ] }, "cve": "CVE-2021-37078", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37078", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398912", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37078", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37078", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2009", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398912", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37078" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "VULHUB", "id": "VHN-398912" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37078", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015952", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2009", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398912", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "id": "VAR-202112-0239", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398912" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:58.586000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173488" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37078" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398912" }, { "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "db": "NVD", "id": "CVE-2021-37078" }, { "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398912" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "date": "2021-12-07T17:15:09.227000", "db": "NVD", "id": "CVE-2021-37078" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398912" }, { "date": "2022-12-05T02:13:00", "db": "JVNDB", "id": "JVNDB-2021-015952" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37078" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2009" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2009" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015952" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2009" } ], "trust": 0.6 } }
var-202111-1766
Vulnerability from variot
There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1766", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39966" } ] }, "cve": "CVE-2021-39966", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39966", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401367", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39966", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39966", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401367", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39966", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017615", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14783", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401367", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39966", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "id": "VAR-202111-1766", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401367" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:25.235000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-909", "trust": 1.1 }, { "problemtype": "Inadequate resource initialization (CWE-909) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39966" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2022-01-03T22:15:09.957000", "db": "NVD", "id": "CVE-2021-39966" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T07:28:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2022-01-13T16:22:11.833000", "db": "NVD", "id": "CVE-2021-39966" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient initialization of resources in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 } }
var-202110-1856
Vulnerability from variot
There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1856", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37111" } ] }, "cve": "CVE-2021-37111", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37111", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398947", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37111", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37111", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398947", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37111", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017379", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398947", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37111", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "id": "VAR-202110-1856", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398947" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.682000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176773" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37111" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2022-01-03T22:15:09.057000", "db": "NVD", "id": "CVE-2021-37111" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T07:04:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2022-01-11T19:31:32.390000", "db": "NVD", "id": "CVE-2021-37111" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in resource allocation without limits or throttling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 } }
var-202112-0263
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure of the network system or product to properly verify the input data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37084" } ] }, "cve": "CVE-2021-37084", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37084", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398919", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37084", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37084", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2006", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398919", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure of the network system or product to properly verify the input data", "sources": [ { "db": "NVD", "id": "CVE-2021-37084" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "VULHUB", "id": "VHN-398919" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37084", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016020", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2006", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01676", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398919", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "id": "VAR-202112-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398919" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.291000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173784" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37084" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398919" }, { "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "db": "NVD", "id": "CVE-2021-37084" }, { "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398919" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "date": "2021-12-07T17:15:09.480000", "db": "NVD", "id": "CVE-2021-37084" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398919" }, { "date": "2022-12-05T06:54:00", "db": "JVNDB", "id": "JVNDB-2021-016020" }, { "date": "2021-12-09T15:14:51.153000", "db": "NVD", "id": "CVE-2021-37084" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2006" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2006" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2006" } ], "trust": 0.6 } }
var-202112-0342
Vulnerability from variot
There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0342", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37093" } ] }, "cve": "CVE-2021-37093", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37093", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398929", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37093", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37093", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398929", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37093", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015867", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08327", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398929", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "id": "VAR-202112-0342", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Improper\u00a0access\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37093" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2021-12-08T15:15:09.973000", "db": "NVD", "id": "CVE-2021-37093" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37093" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 } }
var-202209-0585
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0585", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38997" } ] }, "cve": "CVE-2022-38997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38997", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38997", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38997", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016782", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434768", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "id": "VAR-202209-0585", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.410000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208081" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38997" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38997/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-16T18:15:17.820000", "db": "NVD", "id": "CVE-2022-38997" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-17T03:47:48.817000", "db": "NVD", "id": "CVE-2022-38997" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 } }
var-202111-1771
Vulnerability from variot
The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1771", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39977" } ] }, "cve": "CVE-2021-39977", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39977", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401378", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39977", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39977", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2129", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401378", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39977", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart", "sources": [ { "db": "NVD", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39977", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017595", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2129", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401378", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39977", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "id": "VAR-202111-1771", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401378" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:54:56.351000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176790" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39977" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401378" }, { "db": "VULMON", "id": "CVE-2021-39977" }, { "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "db": "NVD", "id": "CVE-2021-39977" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401378" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39977" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "date": "2022-01-03T22:15:10.427000", "db": "NVD", "id": "CVE-2021-39977" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401378" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39977" }, { "date": "2023-01-27T06:30:00", "db": "JVNDB", "id": "JVNDB-2021-017595" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2129" }, { "date": "2022-01-13T15:59:36.237000", "db": "NVD", "id": "CVE-2021-39977" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017595" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2129" } ], "trust": 0.6 } }
var-202201-1723
Vulnerability from variot
The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in the Huawei HarmonyOS eID component. Successful exploitation of this vulnerability could result in compromised confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1723", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40021" } ] }, "cve": "CVE-2021-40021", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40021", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401422", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40021", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40021", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-278", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401422", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" }, { "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in the Huawei HarmonyOS eID component. Successful exploitation of this vulnerability could result in compromised confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-40021" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "VULHUB", "id": "VHN-401422" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40021", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002902", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-278", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401422", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" }, { "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "id": "VAR-202201-1723", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401422" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:33.319000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177997" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40021" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" }, { "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401422" }, { "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "db": "NVD", "id": "CVE-2021-40021" }, { "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401422" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "date": "2022-01-10T14:10:21.603000", "db": "NVD", "id": "CVE-2021-40021" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401422" }, { "date": "2023-01-25T08:56:00", "db": "JVNDB", "id": "JVNDB-2022-002902" }, { "date": "2022-01-13T03:14:57.353000", "db": "NVD", "id": "CVE-2021-40021" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-278" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-278" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002902" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-278" } ], "trust": 0.6 } }
var-202211-1051
Vulnerability from variot
The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "cve": "CVE-2022-44554", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44554", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2127", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device", "sources": [ { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "VULHUB", "id": "VHN-441941" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44554", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2127", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441941", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "id": "VAR-202211-1051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441941" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:47.728000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214355" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44554/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441941" }, { "date": "2022-11-09T21:15:18.503000", "db": "NVD", "id": "CVE-2022-44554" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441941" }, { "date": "2022-11-14T19:13:19.993000", "db": "NVD", "id": "CVE-2022-44554" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 } }
var-202210-0125
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0125", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46839" } ] }, "cve": "CVE-2021-46839", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46839", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46839", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-170", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "VULHUB", "id": "VHN-430150" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46839", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-019228", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-170", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430150", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "id": "VAR-202210-0125", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430150" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:30.187000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211152" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46839" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46839/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-430150" }, { "date": "2023-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "date": "2022-10-14T16:15:11.920000", "db": "NVD", "id": "CVE-2021-46839" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-430150" }, { "date": "2023-10-24T08:20:00", "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "date": "2022-10-18T14:50:26.943000", "db": "NVD", "id": "CVE-2021-46839" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ], "trust": 0.6 } }
var-202110-1452
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22467" } ] }, "cve": "CVE-2021-22467", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22467", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380902", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22467", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22467", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2059", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380902", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22467", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address", "sources": [ { "db": "NVD", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22467", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014250", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2059", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380902", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22467", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "id": "VAR-202110-1452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380902" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:41.706000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171526" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22467" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380902" }, { "db": "VULMON", "id": "CVE-2021-22467" }, { "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "db": "NVD", "id": "CVE-2021-22467" }, { "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380902" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22467" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "date": "2021-10-28T13:15:09.537000", "db": "NVD", "id": "CVE-2021-22467" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380902" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22467" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014250" }, { "date": "2021-11-01T19:19:54.290000", "db": "NVD", "id": "CVE-2021-22467" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2059" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2059" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014250" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2059" } ], "trust": 0.6 } }
var-202110-1866
Vulnerability from variot
Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1866", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39968" } ] }, "cve": "CVE-2021-39968", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39968", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401369", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39968", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39968", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2215", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401369", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39968", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017613", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2215", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401369", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39968", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "id": "VAR-202110-1866", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401369" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:15.969000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176763" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39968" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401369" }, { "db": "VULMON", "id": "CVE-2021-39968" }, { "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "db": "NVD", "id": "CVE-2021-39968" }, { "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401369" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39968" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "date": "2022-01-03T22:15:10.047000", "db": "NVD", "id": "CVE-2021-39968" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401369" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39968" }, { "date": "2023-01-27T07:18:00", "db": "JVNDB", "id": "JVNDB-2021-017613" }, { "date": "2022-01-13T16:28:17.993000", "db": "NVD", "id": "CVE-2021-39968" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2215" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017613" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2215" } ], "trust": 0.6 } }
var-202201-1063
Vulnerability from variot
The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a buffer error vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised confidentiality. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1063", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40027" } ] }, "cve": "CVE-2021-40027", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40027", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401428", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40027", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40027", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-274", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401428", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" }, { "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a buffer error vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised confidentiality. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2021-40027" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "VULHUB", "id": "VHN-401428" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40027", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005843", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-274", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12806", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401428", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" }, { "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "id": "VAR-202201-1063", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401428" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:05.096000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=177994" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "trust": 1.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40027" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" }, { "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401428" }, { "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "db": "NVD", "id": "CVE-2021-40027" }, { "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401428" }, { "date": "2023-06-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "date": "2022-01-10T14:10:21.810000", "db": "NVD", "id": "CVE-2021-40027" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401428" }, { "date": "2023-06-15T03:05:00", "db": "JVNDB", "id": "JVNDB-2022-005843" }, { "date": "2023-07-06T14:15:10.380000", "db": "NVD", "id": "CVE-2021-40027" }, { "date": "2023-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-274" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-274" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Buffer error vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005843" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-274" } ], "trust": 0.6 } }
var-202209-0453
Vulnerability from variot
The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a buffer overflow vulnerability in HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40017" } ] }, "cve": "CVE-2021-40017", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40017", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40017", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-168", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a buffer overflow vulnerability in HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40017", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020317", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-168", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-64981", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401418", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40017", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "id": "VAR-202209-0453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401418" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.409000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208408" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40017" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40017/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401418" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40017" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "date": "2022-09-16T18:15:11.457000", "db": "NVD", "id": "CVE-2021-40017" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-401418" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40017" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-40017" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ], "trust": 0.6 } }
var-202212-0768
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46324" } ] }, "cve": "CVE-2022-46324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46324", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46324", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2520", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "VULHUB", "id": "VHN-444294" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46324", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024019", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2520", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444294", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "id": "VAR-202212-0768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444294" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:31.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218961" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46324" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46324/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444294" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "date": "2022-12-20T21:15:11.837000", "db": "NVD", "id": "CVE-2022-46324" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444294" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "date": "2022-12-24T04:17:48.310000", "db": "NVD", "id": "CVE-2022-46324" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ], "trust": 0.6 } }
var-202302-0433
Vulnerability from variot
The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48286" } ] }, "cve": "CVE-2022-48286", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48286", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48286", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-348", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48286", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003370", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-348", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453366", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48286", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "id": "VAR-202302-0433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453366" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:18.704000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225749" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48286 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48286" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48286/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48286" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453366" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48286" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "date": "2023-02-09T17:15:12.237000", "db": "NVD", "id": "CVE-2022-48286" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453366" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48286" }, { "date": "2023-09-07T01:16:00", "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48286" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-348" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-348" } ], "trust": 0.6 } }
var-202212-0384
Vulnerability from variot
The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46318" } ] }, "cve": "CVE-2022-46318", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46318", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46318", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202212-2482", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "VULHUB", "id": "VHN-444288" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46318", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024013", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2482", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444288", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "id": "VAR-202212-0384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444288" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:35.642000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218472" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46318" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46318/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444288" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "date": "2022-12-20T21:15:11.547000", "db": "NVD", "id": "CVE-2022-46318" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444288" }, { "date": "2023-12-01T02:32:00", "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "date": "2022-12-24T04:15:49.883000", "db": "NVD", "id": "CVE-2022-46318" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ], "trust": 0.6 } }
var-202210-0209
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41597" } ] }, "cve": "CVE-2022-41597", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41597", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41597", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-154", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "VULHUB", "id": "VHN-437838" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41597", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018790", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-154", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "id": "VAR-202210-0209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437838" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:10.366000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210788" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41597" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41597/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437838" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "date": "2022-10-14T16:15:28.067000", "db": "NVD", "id": "CVE-2022-41597" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437838" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "date": "2022-10-15T01:55:30.273000", "db": "NVD", "id": "CVE-2022-41597" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ], "trust": 0.6 } }
var-202110-1853
Vulnerability from variot
HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity. HarmonyOS There is a code injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1853", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39979" } ] }, "cve": "CVE-2021-39979", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-39979", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-401380", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39979", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39979", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2228", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401380", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity. HarmonyOS There is a code injection vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39979", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2228", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401380", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39979", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "id": "VAR-202110-1853", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401380" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:39.625000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176776" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39979" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401380" }, { "db": "VULMON", "id": "CVE-2021-39979" }, { "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "db": "NVD", "id": "CVE-2021-39979" }, { "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401380" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39979" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "date": "2022-01-03T22:15:10.523000", "db": "NVD", "id": "CVE-2021-39979" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401380" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39979" }, { "date": "2023-01-27T03:22:00", "db": "JVNDB", "id": "JVNDB-2021-017587" }, { "date": "2022-01-13T15:39:19.687000", "db": "NVD", "id": "CVE-2021-39979" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2228" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2228" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Code injection vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2228" } ], "trust": 0.6 } }
var-202210-0286
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0286", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41580" } ] }, "cve": "CVE-2022-41580", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41580", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41580", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-169", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "VULHUB", "id": "VHN-437809" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41580", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018740", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-169", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437809", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "id": "VAR-202210-0286", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437809" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:42.645000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211151" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41580" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41580/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437809" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "date": "2022-10-14T16:15:21.433000", "db": "NVD", "id": "CVE-2022-41580" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437809" }, { "date": "2023-10-23T06:24:00", "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "date": "2022-10-18T14:49:52.020000", "db": "NVD", "id": "CVE-2022-41580" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ], "trust": 0.6 } }
var-202108-0281
Vulnerability from variot
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0281", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22417" } ] }, "cve": "CVE-2021-22417", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22417", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380852", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22417", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22417", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-332", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380852", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22417", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" }, { "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22417", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-332", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380852", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22417", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" }, { "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "id": "VAR-202108-0281", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380852" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:07.974000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159656" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22417" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" }, { "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380852" }, { "db": "VULMON", "id": "CVE-2021-22417" }, { "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "db": "NVD", "id": "CVE-2021-22417" }, { "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380852" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22417" }, { "date": "2022-04-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "date": "2021-08-03T18:15:08.013000", "db": "NVD", "id": "CVE-2021-22417" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380852" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22417" }, { "date": "2022-04-22T06:22:00", "db": "JVNDB", "id": "JVNDB-2021-009380" }, { "date": "2021-08-11T13:24:43.200000", "db": "NVD", "id": "CVE-2021-22417" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-332" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-332" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-332" } ], "trust": 0.6 } }
var-202208-0445
Vulnerability from variot
The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0445", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40030" } ] }, "cve": "CVE-2021-40030", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40030", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40030", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process", "sources": [ { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40030", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020148", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "id": "VAR-202208-0445", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:47.937000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204203" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40030" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40030/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-10T20:15:22.347000", "db": "NVD", "id": "CVE-2021-40030" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-12T21:20:01.687000", "db": "NVD", "id": "CVE-2021-40030" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 } }
var-202209-0201
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38990" } ] }, "cve": "CVE-2022-38990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38990", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38990", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38990", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016789", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "id": "VAR-202209-0201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.630000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208096" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38990/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-16T18:15:17.553000", "db": "NVD", "id": "CVE-2022-38990" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-17T03:45:28.350000", "db": "NVD", "id": "CVE-2022-38990" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 } }
var-202211-0328
Vulnerability from variot
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0328", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44558" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44558" } ] }, "cve": "CVE-2022-44558", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44558", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2123", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "VULHUB", "id": "VHN-441946" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44558", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2123", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441946", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "id": "VAR-202211-0328", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441946" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:28.205000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214353" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44558" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44558/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441946" }, { "date": "2022-11-09T21:15:18.670000", "db": "NVD", "id": "CVE-2022-44558" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441946" }, { "date": "2022-11-14T19:09:40.857000", "db": "NVD", "id": "CVE-2022-44558" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 } }
var-202212-0557
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46323" } ] }, "cve": "CVE-2022-46323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46323", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46323", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2524", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "VULHUB", "id": "VHN-444293" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46323", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024020", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2524", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444293", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "id": "VAR-202212-0557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444293" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:44.509000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218962" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46323" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46323/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444293" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "date": "2022-12-20T21:15:11.787000", "db": "NVD", "id": "CVE-2022-46323" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444293" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "date": "2022-12-24T04:17:37.283000", "db": "NVD", "id": "CVE-2022-46323" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ], "trust": 0.6 } }
var-202209-0199
Vulnerability from variot
The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps. Huawei of EMUI and HarmonyOS There is a vulnerability in deserialization of untrusted data.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS versions prior to 2.0 have a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0199", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39008" } ] }, "cve": "CVE-2022-39008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39008", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39008", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-219", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps. Huawei of EMUI and HarmonyOS There is a vulnerability in deserialization of untrusted data.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS versions prior to 2.0 have a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39008", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-219", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64980", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428483", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39008", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "id": "VAR-202209-0199", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428483" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:42.315000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208618" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39008" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39008/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428483" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39008" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "date": "2022-09-16T18:15:18.210000", "db": "NVD", "id": "CVE-2022-39008" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428483" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39008" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "date": "2022-09-21T13:55:35.557000", "db": "NVD", "id": "CVE-2022-39008" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Untrusted Data Deserialization Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ], "trust": 0.6 } }
var-202210-0284
Vulnerability from variot
The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0284", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41576" } ] }, "cve": "CVE-2022-41576", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41576", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41576", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-177", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "VULHUB", "id": "VHN-437801" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41576", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018796", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-177", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437801", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "id": "VAR-202210-0284", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437801" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:51.329000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210795" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41576" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41576/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437801" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "date": "2022-10-14T16:15:20.110000", "db": "NVD", "id": "CVE-2022-41576" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437801" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "date": "2022-10-15T01:50:36.447000", "db": "NVD", "id": "CVE-2022-41576" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ], "trust": 0.6 } }
var-202112-0950
Vulnerability from variot
The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable. HarmonyOS Exists in a past traversal vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0950", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40001" } ] }, "cve": "CVE-2021-40001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40001", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401402", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40001", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-208", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401402", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" }, { "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable. HarmonyOS Exists in a past traversal vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40001" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "VULHUB", "id": "VHN-401402" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40001", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-017519", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-208", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401402", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" }, { "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "id": "VAR-202112-0950", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401402" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:09.845000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172732" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40001" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202112-0000001183296718" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" }, { "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401402" }, { "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "db": "NVD", "id": "CVE-2021-40001" }, { "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401402" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "date": "2022-01-10T14:10:20.993000", "db": "NVD", "id": "CVE-2021-40001" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401402" }, { "date": "2023-01-24T05:51:00", "db": "JVNDB", "id": "JVNDB-2021-017519" }, { "date": "2022-01-13T16:01:59.027000", "db": "NVD", "id": "CVE-2021-40001" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-208" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-208" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017519" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-208" } ], "trust": 0.6 } }
var-202209-0140
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0140", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38988" } ] }, "cve": "CVE-2022-38988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38988", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38988", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38988", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016791", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428500", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "id": "VAR-202209-0140", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:21.546000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208089" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38988" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38988/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-16T18:15:17.477000", "db": "NVD", "id": "CVE-2022-38988" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-17T03:46:28.717000", "db": "NVD", "id": "CVE-2022-38988" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 } }
var-202209-0452
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38991" } ] }, "cve": "CVE-2022-38991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38991", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38991", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016788", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428507", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "id": "VAR-202209-0452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208087" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38991" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38991/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-16T18:15:17.590000", "db": "NVD", "id": "CVE-2022-38991" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-17T03:46:16.633000", "db": "NVD", "id": "CVE-2022-38991" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 } }
var-202205-0341
Vulnerability from variot
The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0341", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29790" } ] }, "cve": "CVE-2022-29790", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29790", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29790", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29790", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2549", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421299", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-29790", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29790", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009631", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2549", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-57611", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421299", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29790", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "id": "VAR-202205-0341", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421299" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:17.963000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193770" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29790" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29790/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29790" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "date": "2022-05-13T15:15:09.790000", "db": "NVD", "id": "CVE-2022-29790" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421299" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-29790" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "date": "2022-05-23T18:42:44.167000", "db": "NVD", "id": "CVE-2022-29790" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ], "trust": 0.6 } }
var-202205-0249
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29791" } ] }, "cve": "CVE-2022-29791", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29791", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421300", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29791", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29791", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2546", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421300", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29791", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009630", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2546", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53575", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421300", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29791", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "id": "VAR-202205-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421300" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:30.380000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193767" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29791" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29791/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29791" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "date": "2022-05-13T15:15:09.837000", "db": "NVD", "id": "CVE-2022-29791" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29791" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "date": "2022-05-23T18:42:20.940000", "db": "NVD", "id": "CVE-2022-29791" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ], "trust": 0.6 } }
var-202203-0976
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0976", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40064" } ] }, "cve": "CVE-2021-40064", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40064", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401465", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40064", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40064", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401465", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40064", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018700", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401465", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "id": "VAR-202203-0976", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:15.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186004" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40064" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40064/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-10T17:43:24.960000", "db": "NVD", "id": "CVE-2021-40064" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-14T16:17:26.763000", "db": "NVD", "id": "CVE-2021-40064" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 } }
var-202112-0345
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0345", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37069" } ] }, "cve": "CVE-2021-37069", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37069", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398903", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37069", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37069", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398903", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37069", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015863", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398903", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "id": "VAR-202112-0345", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.164000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37069" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-12-08T15:15:09.757000", "db": "NVD", "id": "CVE-2021-37069" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-12-09T17:56:13.047000", "db": "NVD", "id": "CVE-2021-37069" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 } }
var-202210-0127
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0127", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41593" } ] }, "cve": "CVE-2022-41593", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41593", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41593", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-157", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "VULHUB", "id": "VHN-437831" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41593", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-157", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437831", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "id": "VAR-202210-0127", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437831" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:10.438000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210791" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41593" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41593/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437831" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "date": "2022-10-14T16:15:26.613000", "db": "NVD", "id": "CVE-2022-41593" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437831" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "date": "2022-10-15T01:52:41.003000", "db": "NVD", "id": "CVE-2022-41593" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ], "trust": 0.6 } }
var-202112-0232
Vulnerability from variot
There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0232", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37086" } ] }, "cve": "CVE-2021-37086", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37086", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398921", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37086", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37086", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2041", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398921", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37086" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "VULHUB", "id": "VHN-398921" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37086", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016022", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2041", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103542", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398921", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "id": "VAR-202112-0232", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398921" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:30.868000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173798" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37086" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398921" }, { "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "db": "NVD", "id": "CVE-2021-37086" }, { "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398921" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "date": "2021-12-07T17:15:09.567000", "db": "NVD", "id": "CVE-2021-37086" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398921" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016022" }, { "date": "2021-12-09T18:28:06.863000", "db": "NVD", "id": "CVE-2021-37086" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2041" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2041" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016022" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2041" } ], "trust": 0.6 } }
var-202301-0512
Vulnerability from variot
The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability. EMUI and HarmonyOS contains a double free vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0512", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-47975" } ] }, "cve": "CVE-2022-47975", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47975", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-47975", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-436", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability. EMUI and HarmonyOS contains a double free vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47975", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001767", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-436", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449903", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47975", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "id": "VAR-202301-0512", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449903" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:21.183000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02023", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221313" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47975" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47975/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449903" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47975" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "date": "2023-01-06T20:15:09.880000", "db": "NVD", "id": "CVE-2022-47975" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-449903" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47975" }, { "date": "2023-05-09T01:35:00", "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "date": "2023-02-09T17:15:11.837000", "db": "NVD", "id": "CVE-2022-47975" }, { "date": "2023-02-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-436" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Double release vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-436" } ], "trust": 0.6 } }
var-202206-0120
Vulnerability from variot
The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0120", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31757" } ] }, "cve": "CVE-2022-31757", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31757", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423590", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31757", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31757", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423590", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31757", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012034", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66174", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423590", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "id": "VAR-202206-0120", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423590" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:05.452000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198078" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31757" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31757/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-13T16:15:08.723000", "db": "NVD", "id": "CVE-2022-31757" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-27T16:14:54.070000", "db": "NVD", "id": "CVE-2022-31757" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 } }
var-202301-0614
Vulnerability from variot
The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0614", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46868" } ] }, "cve": "CVE-2021-46868", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46868", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46868", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-438", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46868", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001771", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-438", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449873", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "id": "VAR-202301-0614", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449873" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:01.323000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221315" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46868" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46868/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449873" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2021-46868" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "date": "2023-01-06T20:15:09.637000", "db": "NVD", "id": "CVE-2021-46868" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449873" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2021-46868" }, { "date": "2023-05-09T01:58:00", "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "date": "2023-01-12T14:31:11.530000", "db": "NVD", "id": "CVE-2021-46868" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-438" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-438" } ], "trust": 0.6 } }
var-202209-0121
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0121", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38993" } ] }, "cve": "CVE-2022-38993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38993", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38993", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38993", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016786", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428492", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "id": "VAR-202209-0121", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:40.015000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208095" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38993" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38993/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-16T18:15:17.667000", "db": "NVD", "id": "CVE-2022-38993" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-17T03:11:51.240000", "db": "NVD", "id": "CVE-2022-38993" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 } }
var-202110-1859
Vulnerability from variot
HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission. HarmonyOS Exists in a past traversal vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1859", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39970" } ] }, "cve": "CVE-2021-39970", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39970", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401371", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39970", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39970", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2222", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401371", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission. HarmonyOS Exists in a past traversal vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39970", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017611", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2222", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401371", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39970", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "id": "VAR-202110-1859", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401371" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:41.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176770" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39970" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401371" }, { "db": "VULMON", "id": "CVE-2021-39970" }, { "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "db": "NVD", "id": "CVE-2021-39970" }, { "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401371" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39970" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "date": "2022-01-03T22:15:10.140000", "db": "NVD", "id": "CVE-2021-39970" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401371" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39970" }, { "date": "2023-01-27T07:10:00", "db": "JVNDB", "id": "JVNDB-2021-017611" }, { "date": "2022-01-13T15:46:21.260000", "db": "NVD", "id": "CVE-2021-39970" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2222" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2222" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017611" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2222" } ], "trust": 0.6 } }
var-202205-0250
Vulnerability from variot
There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29793" } ] }, "cve": "CVE-2022-29793", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29793", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421302", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29793", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29793", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421302", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-29793", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29793", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009628", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-57610", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421302", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29793", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "id": "VAR-202205-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421302" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:24.584000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193765" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-29793 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29793" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29793/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-29793" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2022-05-13T15:15:09.937000", "db": "NVD", "id": "CVE-2022-29793" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-10T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2023-02-10T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2023-02-10T16:46:32.607000", "db": "NVD", "id": "CVE-2022-29793" }, { "date": "2022-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 } }
var-202207-0143
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0143", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34736" } ] }, "cve": "CVE-2022-34736", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34736", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427077", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34736", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34736", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-419", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427077", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-34736", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34736", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013204", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-419", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-61609", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427077", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34736", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "id": "VAR-202207-0143", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427077" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:57.301000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200890" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34736" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34736/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427077" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34736" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "date": "2022-07-12T14:15:19.300000", "db": "NVD", "id": "CVE-2022-34736" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427077" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34736" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "date": "2022-07-19T12:00:18", "db": "NVD", "id": "CVE-2022-34736" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013204" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ], "trust": 0.6 } }
var-202210-0290
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0290", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41592" } ] }, "cve": "CVE-2022-41592", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41592", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41592", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-158", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "VULHUB", "id": "VHN-437829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41592", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-158", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "id": "VAR-202210-0290", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:15.811000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210792" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41592" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41592/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437829" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "date": "2022-10-14T16:15:26.127000", "db": "NVD", "id": "CVE-2022-41592" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437829" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "date": "2022-10-15T01:52:20.023000", "db": "NVD", "id": "CVE-2022-41592" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ], "trust": 0.6 } }
var-202103-0512
Vulnerability from variot
A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0512", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22296" } ] }, "cve": "CVE-2021-22296", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22296", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380731", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22296", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22296", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202103-215", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380731", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22296", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" }, { "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system. HarmonyOS Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22296", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2021-003926", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202103-215", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380731", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" }, { "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "id": "VAR-202103-0512", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380731" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:34.668000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://device.harmonyos.com/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=143682" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "trust": 1.8, "url": "https://www.tenable.com/cve/cve-2021-22296" }, { "trust": 1.7, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pagesize=10\u0026pageindex=1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22296" }, { "trust": 0.8, "url": "https://gitee.com/openharmony/kernel_liteos_a/pulls/48/files" }, { "trust": 0.1, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026amp;pagesize=10\u0026amp;pageindex=1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" }, { "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380731" }, { "db": "VULMON", "id": "CVE-2021-22296" }, { "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "db": "NVD", "id": "CVE-2021-22296" }, { "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-02T00:00:00", "db": "VULHUB", "id": "VHN-380731" }, { "date": "2021-03-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22296" }, { "date": "2021-11-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "date": "2021-03-02T19:15:13.207000", "db": "NVD", "id": "CVE-2021-22296" }, { "date": "2021-03-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-09T00:00:00", "db": "VULHUB", "id": "VHN-380731" }, { "date": "2021-03-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22296" }, { "date": "2021-11-10T06:36:00", "db": "JVNDB", "id": "JVNDB-2021-003926" }, { "date": "2021-03-09T14:06:23.240000", "db": "NVD", "id": "CVE-2021-22296" }, { "date": "2021-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-215" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003926" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-215" } ], "trust": 0.6 } }
var-202208-0817
Vulnerability from variot
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability. Huawei of EMUI and HarmonyOS There is a vulnerability in improper default permissions.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0817", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37006" } ] }, "cve": "CVE-2022-37006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37006", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2745", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability. Huawei of EMUI and HarmonyOS There is a vulnerability in improper default permissions.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android", "sources": [ { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37006", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014550", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2745", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427596", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37006", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "id": "VAR-202208-0817", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427596" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:19.486000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204382" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37006" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37006/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427596" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37006" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "date": "2022-08-10T20:16:04.613000", "db": "NVD", "id": "CVE-2022-37006" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-427596" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37006" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "date": "2022-10-27T18:38:56.727000", "db": "NVD", "id": "CVE-2022-37006" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ], "trust": 0.6 } }
var-202110-1460
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1460", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22451" } ] }, "cve": "CVE-2021-22451", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22451", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380886", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22451", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22451", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2041", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380886", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22451" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "VULHUB", "id": "VHN-380886" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22451", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014241", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2041", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380886", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "id": "VAR-202110-1460", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380886" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:02.336000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168086" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22451" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380886" }, { "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "db": "NVD", "id": "CVE-2021-22451" }, { "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380886" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "date": "2021-10-28T13:15:08.860000", "db": "NVD", "id": "CVE-2021-22451" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380886" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014241" }, { "date": "2021-11-01T18:56:05.770000", "db": "NVD", "id": "CVE-2021-22451" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2041" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2041" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014241" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2041" } ], "trust": 0.6 } }
var-202111-1764
Vulnerability from variot
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1764", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39967" } ] }, "cve": "CVE-2021-39967", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39967", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401368", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39967", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39967", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401368", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39967", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017614", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14782", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401368", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39967", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "id": "VAR-202111-1764", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401368" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176797" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39967" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2022-01-03T22:15:10", "db": "NVD", "id": "CVE-2021-39967" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T07:25:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2022-01-13T16:23:38.167000", "db": "NVD", "id": "CVE-2021-39967" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Improper Default Permission Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 } }
var-202210-0344
Vulnerability from variot
The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41577" } ] }, "cve": "CVE-2022-41577", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41577", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41577", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-176", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "VULHUB", "id": "VHN-437803" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41577", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018795", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-176", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437803", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "id": "VAR-202210-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437803" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:53.208000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210794" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41577" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41577/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437803" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "date": "2022-10-14T16:15:20.537000", "db": "NVD", "id": "CVE-2022-41577" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437803" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "date": "2022-10-15T01:51:25.887000", "db": "NVD", "id": "CVE-2022-41577" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ], "trust": 0.6 } }
var-202112-0222
Vulnerability from variot
There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed. Huawei Smartphones have an authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that does not effectively authenticate user identities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0222", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37100" } ] }, "cve": "CVE-2021-37100", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37100", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398937", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37100", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37100", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2023", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398937", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed. Huawei Smartphones have an authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that does not effectively authenticate user identities", "sources": [ { "db": "NVD", "id": "CVE-2021-37100" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "VULHUB", "id": "VHN-398937" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37100", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015946", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2023", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103533", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398937", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "id": "VAR-202112-0222", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398937" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.466000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173501" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37100" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398937" }, { "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "db": "NVD", "id": "CVE-2021-37100" }, { "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398937" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "date": "2021-12-07T17:15:09.980000", "db": "NVD", "id": "CVE-2021-37100" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398937" }, { "date": "2022-12-05T01:40:00", "db": "JVNDB", "id": "JVNDB-2021-015946" }, { "date": "2021-12-09T17:32:52.810000", "db": "NVD", "id": "CVE-2021-37100" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2023" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2023" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Authentication Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015946" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2023" } ], "trust": 0.6 } }
var-202212-0385
Vulnerability from variot
The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0385", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46321" } ] }, "cve": "CVE-2022-46321", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46321", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46321", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2481", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "VULHUB", "id": "VHN-444291" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46321", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024015", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2481", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444291", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "id": "VAR-202212-0385", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444291" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:10.860000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218944" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46321" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46321/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444291" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "date": "2022-12-20T21:15:11.690000", "db": "NVD", "id": "CVE-2022-46321" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444291" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "date": "2022-12-24T04:16:32.950000", "db": "NVD", "id": "CVE-2022-46321" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ], "trust": 0.6 } }
var-202302-0368
Vulnerability from variot
The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48288" } ] }, "cve": "CVE-2022-48288", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48288", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48288", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-349", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48288", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-349", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453368", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48288", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "id": "VAR-202302-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453368" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:18.791000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225750" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48288 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48288" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48288/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48288" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453368" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48288" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "date": "2023-02-09T17:15:12.650000", "db": "NVD", "id": "CVE-2022-48288" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453368" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48288" }, { "date": "2023-09-07T01:46:00", "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "date": "2023-02-16T14:17:00.243000", "db": "NVD", "id": "CVE-2022-48288" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-349" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-349" } ], "trust": 0.6 } }
var-202210-0347
Vulnerability from variot
The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38983" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38983" } ] }, "cve": "CVE-2022-38983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38983", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-171", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution", "sources": [ { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "VULHUB", "id": "VHN-434762" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38983", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-171", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "id": "VAR-202210-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434762" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:51.263000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211153" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38983/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434762" }, { "date": "2022-10-14T16:15:14.843000", "db": "NVD", "id": "CVE-2022-38983" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434762" }, { "date": "2022-10-18T13:21:24.750000", "db": "NVD", "id": "CVE-2022-38983" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 } }
var-202208-0488
Vulnerability from variot
The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37005" } ] }, "cve": "CVE-2022-37005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37005", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014551", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427497", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "id": "VAR-202208-0488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427497" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:39.778000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for parameter injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204366" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-10T20:16:04.443000", "db": "NVD", "id": "CVE-2022-37005" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-15T18:00:07.387000", "db": "NVD", "id": "CVE-2022-37005" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 } }
var-202209-0253
Vulnerability from variot
The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39000" } ] }, "cve": "CVE-2022-39000", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39000", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39000", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39000", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017154", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81255", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428487", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39000", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "id": "VAR-202209-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428487" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:37.910000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208409" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39000" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39000/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-16T18:15:17.900000", "db": "NVD", "id": "CVE-2022-39000" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T08:51:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-20T19:07:54.390000", "db": "NVD", "id": "CVE-2022-39000" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 } }
var-202209-0278
Vulnerability from variot
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0278", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46836" } ] }, "cve": "CVE-2021-46836", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46836", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46836", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-213", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46836", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017272", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-213", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64979", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428486", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "id": "VAR-202209-0278", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428486" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:03.509000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208410" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46836" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46836/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428486" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-46836" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "date": "2022-09-16T18:15:11.757000", "db": "NVD", "id": "CVE-2021-46836" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-428486" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-46836" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "date": "2022-09-20T16:56:03.127000", "db": "NVD", "id": "CVE-2021-46836" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ], "trust": 0.6 } }
var-202204-0754
Vulnerability from variot
The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0754", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22256" } ] }, "cve": "CVE-2022-22256", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22256", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409785", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22256", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22256", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409785", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22256", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22256", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008143", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44625", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409785", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22256", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "id": "VAR-202204-0754", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409785" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:14.353000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=190069" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22256" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22256/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-11T20:15:19.657000", "db": "NVD", "id": "CVE-2022-22256" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-19T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-19T14:49:07.153000", "db": "NVD", "id": "CVE-2022-22256" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 } }
var-202112-0241
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0241", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37076" } ] }, "cve": "CVE-2021-37076", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37076", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398910", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37076", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37076", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2010", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398910", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37076" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "VULHUB", "id": "VHN-398910" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37076", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015956", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2010", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398910", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "id": "VAR-202112-0241", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398910" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:25.028000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173489" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37076" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398910" }, { "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "db": "NVD", "id": "CVE-2021-37076" }, { "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398910" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "date": "2021-12-07T17:15:09.137000", "db": "NVD", "id": "CVE-2021-37076" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398910" }, { "date": "2022-12-05T02:34:00", "db": "JVNDB", "id": "JVNDB-2021-015956" }, { "date": "2021-12-09T17:36:31.383000", "db": "NVD", "id": "CVE-2021-37076" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2010" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2010" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015956" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2010" } ], "trust": 0.6 } }
var-202302-0467
Vulnerability from variot
The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0467", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48298" } ] }, "cve": "CVE-2022-48298", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48298", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48298", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-350", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48298", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-350", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453378", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48298", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "id": "VAR-202302-0467", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453378" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:19.866000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225751" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1284", "trust": 1.0 }, { "problemtype": "Improper validation of quantity specified in input (CWE-1284) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48298" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48298/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453378" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48298" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "date": "2023-02-09T17:15:14.687000", "db": "NVD", "id": "CVE-2022-48298" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453378" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48298" }, { "date": "2023-09-07T01:58:00", "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48298" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-350" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Validation of Quantities Specified in Inputs in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-350" } ], "trust": 0.6 } }
var-202201-1715
Vulnerability from variot
There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1715", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40038" } ] }, "cve": "CVE-2021-40038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40038", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401439", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40038", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40038", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401439", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40038", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40038", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002910", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401439", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40038", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "id": "VAR-202201-1715", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401439" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:47.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177453" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40038" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-10T14:10:22.707000", "db": "NVD", "id": "CVE-2021-40038" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-13T15:38:03.063000", "db": "NVD", "id": "CVE-2021-40038" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 } }
var-202108-2284
Vulnerability from variot
Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2284", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22441" } ] }, "cve": "CVE-2021-22441", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22441", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380876", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22441", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22441", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-2830", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380876", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22441" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "VULHUB", "id": "VHN-380876" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22441", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018625", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2830", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380876", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "id": "VAR-202108-2284", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380876" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:48.758000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172038" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22441" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22441/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380876" }, { "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "db": "NVD", "id": "CVE-2021-22441" }, { "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380876" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "date": "2022-02-25T19:15:10.617000", "db": "NVD", "id": "CVE-2021-22441" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380876" }, { "date": "2023-07-04T02:07:00", "db": "JVNDB", "id": "JVNDB-2021-018625" }, { "date": "2022-03-07T18:59:28.417000", "db": "NVD", "id": "CVE-2021-22441" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2830" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2830" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018625" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2830" } ], "trust": 0.6 } }
var-202111-0883
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0883", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37004" } ] }, "cve": "CVE-2021-37004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37004", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398835", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37004", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1877", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398835", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37004" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "VULHUB", "id": "VHN-398835" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37004", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015635", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1877", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398835", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "id": "VAR-202111-0883", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398835" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:15.599000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172176" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37004" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398835" }, { "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "db": "NVD", "id": "CVE-2021-37004" }, { "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398835" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "date": "2021-11-23T16:15:08.847000", "db": "NVD", "id": "CVE-2021-37004" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398835" }, { "date": "2022-11-28T04:59:00", "db": "JVNDB", "id": "JVNDB-2021-015635" }, { "date": "2021-11-29T16:05:11.830000", "db": "NVD", "id": "CVE-2021-37004" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1877" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1877" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015635" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1877" } ], "trust": 0.6 } }
var-202206-0376
Vulnerability from variot
The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0376", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31755" } ] }, "cve": "CVE-2022-31755", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31755", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423588", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31755", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31755", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423588", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31755", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31755", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011281", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66179", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423588", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31755", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "id": "VAR-202206-0376", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423588" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:37.162000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195990" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31755 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31755" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31755/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/281.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31755" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-06-13T15:15:10.100000", "db": "NVD", "id": "CVE-2022-31755" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-10-05T14:59:00.427000", "db": "NVD", "id": "CVE-2022-31755" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Improper Retention of Permissions Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 } }
var-202109-1957
Vulnerability from variot
The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS The module contains a buffer error vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1957", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22479" } ] }, "cve": "CVE-2021-22479", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22479", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380914", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22479", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22479", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2056", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380914", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. HarmonyOS The module contains a buffer error vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22479" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "VULHUB", "id": "VHN-380914" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22479", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018623", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2056", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380914", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "id": "VAR-202109-1957", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380914" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:01.647000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171924" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22479" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22479/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380914" }, { "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "db": "NVD", "id": "CVE-2021-22479" }, { "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380914" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "date": "2022-02-25T19:15:11.063000", "db": "NVD", "id": "CVE-2021-22479" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380914" }, { "date": "2023-07-04T01:53:00", "db": "JVNDB", "id": "JVNDB-2021-018623" }, { "date": "2022-03-07T19:12:47.297000", "db": "NVD", "id": "CVE-2021-22479" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2056" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2056" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Buffer error vulnerability in module", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018623" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2056" } ], "trust": 0.6 } }
var-202212-0613
Vulnerability from variot
The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone's camera and microphone. Huawei of HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0613", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.0.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46313" } ] }, "cve": "CVE-2022-46313", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46313", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46313", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202212-2494", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone\u0027s camera and microphone. Huawei of HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46313" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "VULHUB", "id": "VHN-444283" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46313", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023886", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2494", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444283", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "id": "VAR-202212-0613", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444283" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:26:54.707000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218950" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46313" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46313/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444283" }, { "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "db": "NVD", "id": "CVE-2022-46313" }, { "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444283" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "date": "2022-12-20T21:15:11.300000", "db": "NVD", "id": "CVE-2022-46313" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444283" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023886" }, { "date": "2022-12-24T04:14:51.410000", "db": "NVD", "id": "CVE-2022-46313" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2494" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2494" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023886" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2494" } ], "trust": 0.6 } }
var-202209-0123
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38987" } ] }, "cve": "CVE-2022-38987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38987", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38987", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "id": "VAR-202209-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:58.934000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208093" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38987" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38987/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-16T18:15:17.437000", "db": "NVD", "id": "CVE-2022-38987" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-17T03:46:36.700000", "db": "NVD", "id": "CVE-2022-38987" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 } }
var-202302-0347
Vulnerability from variot
The phone-PC collaboration module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality and integrity. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48290" } ] }, "cve": "CVE-2022-48290", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48290", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48290", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202302-340", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" }, { "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phone-PC collaboration module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality and integrity. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48290", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003377", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-340", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453370", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48290", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" }, { "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "id": "VAR-202302-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453370" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:18.816000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225742" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48290 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48290" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48290/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48290" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" }, { "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453370" }, { "db": "VULMON", "id": "CVE-2022-48290" }, { "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "db": "NVD", "id": "CVE-2022-48290" }, { "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453370" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48290" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "date": "2023-02-09T17:15:13.053000", "db": "NVD", "id": "CVE-2022-48290" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453370" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48290" }, { "date": "2023-09-07T01:50:00", "db": "JVNDB", "id": "JVNDB-2023-003377" }, { "date": "2023-02-16T19:08:47.413000", "db": "NVD", "id": "CVE-2022-48290" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-340" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-340" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003377" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-340" } ], "trust": 0.6 } }
var-202110-1849
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1849", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37114" } ] }, "cve": "CVE-2021-37114", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37114", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398950", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37114", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37114", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398950", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37114", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398950", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37114", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "id": "VAR-202110-1849", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398950" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:24.962000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176780" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37114" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2022-01-03T22:15:09.227000", "db": "NVD", "id": "CVE-2021-37114" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T06:34:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2022-01-11T19:39:59.973000", "db": "NVD", "id": "CVE-2021-37114" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 } }
var-202209-0321
Vulnerability from variot
The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0321", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39006" } ] }, "cve": "CVE-2022-39006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39006", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39006", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64986", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39006", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "id": "VAR-202209-0321", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428494" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:14.188000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208617" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39006" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39006/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-16T18:15:18.133000", "db": "NVD", "id": "CVE-2022-39006" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-21T12:55:11.720000", "db": "NVD", "id": "CVE-2022-39006" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 } }
var-202212-0449
Vulnerability from variot
The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46856" } ] }, "cve": "CVE-2021-46856", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46856", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46856", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2490", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "VULHUB", "id": "VHN-430164" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46856", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003430", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2490", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430164", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "id": "VAR-202212-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430164" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:32.236000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02023", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=219372" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46856" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46856/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-430164" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "date": "2022-12-20T21:15:10.427000", "db": "NVD", "id": "CVE-2021-46856" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-09T00:00:00", "db": "VULHUB", "id": "VHN-430164" }, { "date": "2023-02-17T01:53:00", "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "date": "2023-11-07T03:40:05.423000", "db": "NVD", "id": "CVE-2021-46856" }, { "date": "2023-01-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2490" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2490" } ], "trust": 0.6 } }
var-202209-0449
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38989" } ] }, "cve": "CVE-2022-38989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38989", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38989", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38989", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016790", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428498", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "id": "VAR-202209-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:32.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208091" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38989/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-16T18:15:17.513000", "db": "NVD", "id": "CVE-2022-38989" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-17T03:45:39.930000", "db": "NVD", "id": "CVE-2022-38989" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 } }
var-202212-0421
Vulnerability from variot
Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0421", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "cve": "CVE-2022-46327", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46327", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2511", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions", "sources": [ { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "VULHUB", "id": "VHN-444297" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46327", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202212-2511", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444297", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "id": "VAR-202212-0421", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444297" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:10.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218958" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46327/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444297" }, { "date": "2022-12-20T21:15:11.987000", "db": "NVD", "id": "CVE-2022-46327" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444297" }, { "date": "2022-12-24T04:16:53.907000", "db": "NVD", "id": "CVE-2022-46327" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 } }
var-202111-1783
Vulnerability from variot
The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in a vulnerability related to illegal type conversion.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1783", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39989" } ] }, "cve": "CVE-2021-39989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39989", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401390", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39989", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39989", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2123", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401390", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in a vulnerability related to illegal type conversion.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain", "sources": [ { "db": "NVD", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39989", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017725", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2123", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08454", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401390", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39989", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "id": "VAR-202111-1783", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401390" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.580000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176784" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-704", "trust": 1.1 }, { "problemtype": "Illegal type conversion or cast (CWE-704) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401390" }, { "db": "VULMON", "id": "CVE-2021-39989" }, { "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "db": "NVD", "id": "CVE-2021-39989" }, { "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401390" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39989" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "date": "2022-01-03T22:15:10.980000", "db": "NVD", "id": "CVE-2021-39989" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401390" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39989" }, { "date": "2023-02-02T02:24:00", "db": "JVNDB", "id": "JVNDB-2021-017725" }, { "date": "2022-01-14T16:00:42.303000", "db": "NVD", "id": "CVE-2021-39989" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2123" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Illegal type conversion vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017725" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2123" } ], "trust": 0.6 } }
var-202112-0247
Vulnerability from variot
There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0247", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37067" } ] }, "cve": "CVE-2021-37067", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37067", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398901", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37067", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37067", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2012", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398901", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37067" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "VULHUB", "id": "VHN-398901" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37067", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015982", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2012", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398901", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "id": "VAR-202112-0247", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398901" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:39.533000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173491" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37067" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398901" }, { "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "db": "NVD", "id": "CVE-2021-37067" }, { "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398901" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "date": "2021-12-07T17:15:08.883000", "db": "NVD", "id": "CVE-2021-37067" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398901" }, { "date": "2022-12-05T03:12:00", "db": "JVNDB", "id": "JVNDB-2021-015982" }, { "date": "2021-12-09T17:38:10.913000", "db": "NVD", "id": "CVE-2021-37067" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Information disclosure vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015982" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2012" } ], "trust": 0.6 } }
var-202107-0371
Vulnerability from variot
A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22318" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22318" } ] }, "cve": "CVE-2021-22318", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380753", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2021-22318", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22318", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-1014", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380753", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22318", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "NVD", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service", "sources": [ { "db": "NVD", "id": "CVE-2021-22318" }, { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22318", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-1014", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380753", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22318", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "NVD", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" } ] }, "id": "VAR-202107-0371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380753" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:47:03.897000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "NVD", "id": "CVE-2021-22318" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pagesize=10\u0026pageindex=1" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22318" }, { "trust": 0.1, "url": "https://device.harmonyos.com/cn/console/safetydetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026amp;pagesize=10\u0026amp;pageindex=1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "NVD", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380753" }, { "db": "VULMON", "id": "CVE-2021-22318" }, { "db": "NVD", "id": "CVE-2021-22318" }, { "db": "CNNVD", "id": "CNNVD-202107-1014" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-14T00:00:00", "db": "VULHUB", "id": "VHN-380753" }, { "date": "2021-07-14T00:00:00", "db": "VULMON", "id": "CVE-2021-22318" }, { "date": "2021-07-14T11:15:07.710000", "db": "NVD", "id": "CVE-2021-22318" }, { "date": "2021-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1014" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-15T00:00:00", "db": "VULHUB", "id": "VHN-380753" }, { "date": "2021-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-22318" }, { "date": "2021-07-15T23:50:07.887000", "db": "NVD", "id": "CVE-2021-22318" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-1014" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1014" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1014" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-1014" } ], "trust": 0.6 } }
var-202206-0263
Vulnerability from variot
The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46812" } ] }, "cve": "CVE-2021-46812", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46812", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423545", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46812", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46812", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-471", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423545", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46812", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46812", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011373", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-471", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66175", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423545", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "id": "VAR-202206-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423545" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:40.636000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46812" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46812/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423545" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46812" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "date": "2022-06-13T16:15:08.137000", "db": "NVD", "id": "CVE-2021-46812" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423545" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46812" }, { "date": "2023-08-21T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "date": "2022-06-18T03:12:06.017000", "db": "NVD", "id": "CVE-2021-46812" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-471" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-471" } ], "trust": 0.6 } }
var-202209-0322
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38979" } ] }, "cve": "CVE-2022-38979", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38979", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38979", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38979", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428508", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "id": "VAR-202209-0322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:27.861000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208086" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38979" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38979/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-16T18:15:17.387000", "db": "NVD", "id": "CVE-2022-38979" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-17T03:18:37.613000", "db": "NVD", "id": "CVE-2022-38979" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 } }
var-202209-0431
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0431", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38995" } ] }, "cve": "CVE-2022-38995", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38995", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38995", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-175", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "VULHUB", "id": "VHN-434767" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38995", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016784", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-175", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434767", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "id": "VAR-202209-0431", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434767" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.504000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208082" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38995" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38995/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434767" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "date": "2022-09-16T18:15:17.743000", "db": "NVD", "id": "CVE-2022-38995" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-434767" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "date": "2022-09-17T03:12:10.783000", "db": "NVD", "id": "CVE-2022-38995" }, { "date": "2022-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ], "trust": 0.6 } }
var-202211-0461
Vulnerability from variot
Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0461", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44556" } ] }, "cve": "CVE-2022-44556", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44556", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44556", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2335", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "VULHUB", "id": "VHN-441944" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44556", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020502", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2335", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441944", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "id": "VAR-202211-0461", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441944" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:48.096000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213747" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44556" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44556/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-08T00:00:00", "db": "VULHUB", "id": "VHN-441944" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "date": "2022-11-08T18:15:11.483000", "db": "NVD", "id": "CVE-2022-44556" }, { "date": "2022-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-03T00:00:00", "db": "VULHUB", "id": "VHN-441944" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "date": "2023-11-07T03:54:19.583000", "db": "NVD", "id": "CVE-2022-44556" }, { "date": "2022-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ], "trust": 0.6 } }
var-202111-1772
Vulnerability from variot
The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1772", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39983" } ] }, "cve": "CVE-2021-39983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39983", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401384", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39983", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39983", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2128", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401384", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39983", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS HwNearbyMain", "sources": [ { "db": "NVD", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39983", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017583", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2128", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08455", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401384", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39983", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "id": "VAR-202111-1772", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401384" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:59:48.157000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176789" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39983" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401384" }, { "db": "VULMON", "id": "CVE-2021-39983" }, { "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "db": "NVD", "id": "CVE-2021-39983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401384" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39983" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "date": "2022-01-03T22:15:10.747000", "db": "NVD", "id": "CVE-2021-39983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401384" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39983" }, { "date": "2023-01-27T03:09:00", "db": "JVNDB", "id": "JVNDB-2021-017583" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2128" }, { "date": "2022-01-13T17:37:31.923000", "db": "NVD", "id": "CVE-2021-39983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2128" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017583" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2128" } ], "trust": 0.6 } }
var-202207-0134
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34740" } ] }, "cve": "CVE-2022-34740", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34740", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427089", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34740", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34740", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427089", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34740", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function", "sources": [ { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34740", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013200", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57612", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427089", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34740", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "id": "VAR-202207-0134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427089" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:22.245000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199746" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34740" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34740/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-12T14:15:19.453000", "db": "NVD", "id": "CVE-2022-34740" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-19T14:08:05.747000", "db": "NVD", "id": "CVE-2022-34740" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 } }
var-202210-0287
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "cve": "CVE-2022-41581", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41581", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-167", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access", "sources": [ { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "VULHUB", "id": "VHN-437811" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41581", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-167", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "id": "VAR-202210-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437811" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:25.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211149" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41581/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437811" }, { "date": "2022-10-14T16:15:22.013000", "db": "NVD", "id": "CVE-2022-41581" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437811" }, { "date": "2022-10-18T17:33:57.627000", "db": "NVD", "id": "CVE-2022-41581" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 } }
var-202112-0944
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0944", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39996" } ] }, "cve": "CVE-2021-39996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39996", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05170", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401397", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39996", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39996", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-05170", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401397", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39996", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017522", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05170", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401397", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "id": "VAR-202112-0944", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" } ] }, "last_update_date": "2023-12-18T12:26:32.581000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Heap Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315096" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172738" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39996" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2022-01-10T14:10:20.823000", "db": "NVD", "id": "CVE-2021-39996" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T06:07:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2022-01-13T02:13:52.250000", "db": "NVD", "id": "CVE-2021-39996" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017522" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 } }
var-202212-0650
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0650", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46320" } ] }, "cve": "CVE-2022-46320", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46320", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46320", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2506", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "VULHUB", "id": "VHN-444290" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46320", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024016", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2506", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444290", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "id": "VAR-202212-0650", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444290" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:49.408000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218956" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46320" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46320/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444290" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "date": "2022-12-20T21:15:11.647000", "db": "NVD", "id": "CVE-2022-46320" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444290" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "date": "2022-12-24T04:16:20.820000", "db": "NVD", "id": "CVE-2022-46320" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ], "trust": 0.6 } }
var-202205-0115
Vulnerability from variot
The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS security component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0115", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29792" } ] }, "cve": "CVE-2022-29792", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-29792", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-421301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29792", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29792", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2550", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421301", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS security component", "sources": [ { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29792", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009629", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2550", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-50634", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421301", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29792", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "id": "VAR-202205-0115", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421301" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:54.737000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193771" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29792" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29792/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29792" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "date": "2022-05-13T15:15:09.887000", "db": "NVD", "id": "CVE-2022-29792" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29792" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "date": "2022-05-23T18:41:49.983000", "db": "NVD", "id": "CVE-2022-29792" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ], "trust": 0.6 } }
var-202209-0256
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38996" } ] }, "cve": "CVE-2022-38996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38996", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38996", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-179", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "VULHUB", "id": "VHN-428513" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38996", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016783", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-179", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428513", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "id": "VAR-202209-0256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428513" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:53.663000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208084" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38996" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38996/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428513" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "date": "2022-09-16T18:15:17.780000", "db": "NVD", "id": "CVE-2022-38996" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428513" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "date": "2022-09-17T03:46:47.113000", "db": "NVD", "id": "CVE-2022-38996" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ], "trust": 0.6 } }
var-202207-0112
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0112", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34741" } ] }, "cve": "CVE-2022-34741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34741", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427090", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34741", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34741", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427090", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34741", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated", "sources": [ { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34741", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013199", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52819", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427090", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "id": "VAR-202207-0112", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427090" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:34.914000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199745" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34741" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34741/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-12T14:15:19.493000", "db": "NVD", "id": "CVE-2022-34741" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-19T14:10:47.477000", "db": "NVD", "id": "CVE-2022-34741" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 } }
var-202206-0260
Vulnerability from variot
The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31758" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31758" } ] }, "cve": "CVE-2022-31758", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-423591", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2022-31758", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31758", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423591", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31758", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31758", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66182", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423591", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31758", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "id": "VAR-202206-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423591" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:52.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196950" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31758/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-13T15:15:10.227000", "db": "NVD", "id": "CVE-2022-31758" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-21T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-21T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-21T18:08:15.080000", "db": "NVD", "id": "CVE-2022-31758" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Competitive conditional vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 } }
var-202302-0392
Vulnerability from variot
The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications). EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0392", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48295" } ] }, "cve": "CVE-2022-48295", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48295", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48295", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-352", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications). EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48295", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003621", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-352", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "id": "VAR-202302-0392", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453375" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:14.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225929" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48295" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48295/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453375" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48295" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "date": "2023-02-09T17:15:14.113000", "db": "NVD", "id": "CVE-2022-48295" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453375" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48295" }, { "date": "2023-09-14T07:48:00", "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "date": "2023-02-17T13:43:06.680000", "db": "NVD", "id": "CVE-2022-48295" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-352" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-352" } ], "trust": 0.6 } }
var-202201-1018
Vulnerability from variot
There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40011" } ] }, "cve": "CVE-2021-40011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40011", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-03943", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401412", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40011", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40011", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-03943", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401412", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40011", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002890", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-03943", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401412", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "id": "VAR-202201-1018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" } ] }, "last_update_date": "2023-12-18T13:32:22.572000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02022", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "title": "Patch for HuaWei smartphone denial of service vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/313801" }, { "title": "Huawei Smartphone Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178042" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40011" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-01-10T14:10:21.407000", "db": "NVD", "id": "CVE-2021-40011" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-04-25T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T03:30:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-04-25T17:57:56.870000", "db": "NVD", "id": "CVE-2021-40011" }, { "date": "2022-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product resource exhaustion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 } }
var-202112-0249
Vulnerability from variot
There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from incorrect input validation in the kernel module of HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37065" } ] }, "cve": "CVE-2021-37065", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37065", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398899", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37065", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37065", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2037", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398899", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from incorrect input validation in the kernel module of HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37065" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "VULHUB", "id": "VHN-398899" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37065", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016032", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2037", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44616", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398899", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "id": "VAR-202112-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398899" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.209000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173514" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37065" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398899" }, { "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "db": "NVD", "id": "CVE-2021-37065" }, { "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398899" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "date": "2021-12-07T17:15:08.800000", "db": "NVD", "id": "CVE-2021-37065" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398899" }, { "date": "2022-12-05T07:11:00", "db": "JVNDB", "id": "JVNDB-2021-016032" }, { "date": "2021-12-09T17:39:41.403000", "db": "NVD", "id": "CVE-2021-37065" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2037" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016032" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2037" } ], "trust": 0.6 } }
var-202112-0945
Vulnerability from variot
The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0945", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40005" } ] }, "cve": "CVE-2021-40005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40005", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05171", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401406", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40005", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-05171", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-213", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401406", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" }, { "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40005" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40005", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017514", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05171", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-213", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401406", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" }, { "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "id": "VAR-202112-0945", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" } ] }, "last_update_date": "2023-12-18T13:37:10.685000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Vulnerability of improper access control in Huawei HarmonyOS Wearables", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315091" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172737" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40005" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" }, { "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05171" }, { "db": "VULHUB", "id": "VHN-401406" }, { "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "db": "NVD", "id": "CVE-2021-40005" }, { "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05171" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401406" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "date": "2022-01-10T14:10:21.187000", "db": "NVD", "id": "CVE-2021-40005" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05171" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401406" }, { "date": "2023-01-24T05:24:00", "db": "JVNDB", "id": "JVNDB-2021-017514" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40005" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-213" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017514" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-213" } ], "trust": 0.6 } }
var-202107-1680
Vulnerability from variot
There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1680", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22430" } ] }, "cve": "CVE-2021-22430", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22430", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380865", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22430", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22430", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380865", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22430", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018745", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380865", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "id": "VAR-202107-1680", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:09.853000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171998" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-94", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22430" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22430/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2022-02-25T19:15:09.610000", "db": "NVD", "id": "CVE-2021-22430" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T01:50:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22430" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 } }
var-202211-0633
Vulnerability from variot
The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0633", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44546" } ] }, "cve": "CVE-2022-44546", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44546", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44546", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2139", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "VULHUB", "id": "VHN-441924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44546", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020507", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2139", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "id": "VAR-202211-0633", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441924" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:54.780000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213976" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44546" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44546/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441924" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "date": "2022-11-09T21:15:17.930000", "db": "NVD", "id": "CVE-2022-44546" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441924" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "date": "2022-11-10T13:52:04.360000", "db": "NVD", "id": "CVE-2022-44546" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ], "trust": 0.6 } }
var-202112-0254
Vulnerability from variot
There is a Weaknesses Introduced During Design. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37059" } ] }, "cve": "CVE-2021-37059", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37059", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398892", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37059", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37059", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2015", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398892", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Weaknesses Introduced During Design. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37059" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "VULHUB", "id": "VHN-398892" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37059", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016047", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2015", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398892", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "id": "VAR-202112-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398892" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:53.976000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173494" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37059" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398892" }, { "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "db": "NVD", "id": "CVE-2021-37059" }, { "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398892" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "date": "2021-12-07T17:15:08.550000", "db": "NVD", "id": "CVE-2021-37059" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398892" }, { "date": "2022-12-05T07:39:00", "db": "JVNDB", "id": "JVNDB-2021-016047" }, { "date": "2021-12-09T17:40:36.840000", "db": "NVD", "id": "CVE-2021-37059" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2015" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2015" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016047" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2015" } ], "trust": 0.6 } }
var-202211-0452
Vulnerability from variot
The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46851" } ] }, "cve": "CVE-2021-46851", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46851", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46851", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2138", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "VULHUB", "id": "VHN-430159" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46851", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020635", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2138", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430159", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "id": "VAR-202211-0452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430159" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:41.797000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213975" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46851" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46851/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-430159" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "date": "2022-11-09T21:15:12.877000", "db": "NVD", "id": "CVE-2021-46851" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-430159" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "date": "2022-11-10T19:26:24.317000", "db": "NVD", "id": "CVE-2021-46851" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ], "trust": 0.6 } }
var-202110-1852
Vulnerability from variot
PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1852", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37132" } ] }, "cve": "CVE-2021-37132", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37132", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398968", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37132", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37132", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2229", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398968", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37132", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017296", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2229", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08315", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398968", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37132", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "id": "VAR-202110-1852", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398968" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:42.796000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176777" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37132" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398968" }, { "db": "VULMON", "id": "CVE-2021-37132" }, { "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "db": "NVD", "id": "CVE-2021-37132" }, { "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398968" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37132" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "date": "2022-01-03T22:15:09.747000", "db": "NVD", "id": "CVE-2021-37132" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398968" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37132" }, { "date": "2023-01-13T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-017296" }, { "date": "2022-01-11T20:06:28.397000", "db": "NVD", "id": "CVE-2021-37132" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2229" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2229" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017296" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2229" } ], "trust": 0.6 } }
var-202108-0284
Vulnerability from variot
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0284", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22420" } ] }, "cve": "CVE-2021-22420", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22420", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380855", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22420", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22420", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-317", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380855", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22420", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" }, { "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22420", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009369", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-317", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380855", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22420", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" }, { "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "id": "VAR-202108-0284", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380855" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:39.514000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159648" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Externally controllable reference to another region resource (CWE-610) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22420" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/610.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" }, { "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380855" }, { "db": "VULMON", "id": "CVE-2021-22420" }, { "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "db": "NVD", "id": "CVE-2021-22420" }, { "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380855" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22420" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "date": "2021-08-03T18:15:08.127000", "db": "NVD", "id": "CVE-2021-22420" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380855" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22420" }, { "date": "2022-04-21T08:56:00", "db": "JVNDB", "id": "JVNDB-2021-009369" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22420" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-317" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-317" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in externally controllable reference to another area resource in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009369" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-317" } ], "trust": 0.6 } }
var-202211-0369
Vulnerability from variot
The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "cve": "CVE-2022-44551", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44551", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2135", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability", "sources": [ { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "VULHUB", "id": "VHN-441934" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44551", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2135", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441934", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "id": "VAR-202211-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441934" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:26:59.534000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214357" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44551/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441934" }, { "date": "2022-11-09T21:15:18.293000", "db": "NVD", "id": "CVE-2022-44551" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441934" }, { "date": "2022-11-14T19:15:45.333000", "db": "NVD", "id": "CVE-2022-44551" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 } }
var-202212-0527
Vulnerability from variot
The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0527", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46315" } ] }, "cve": "CVE-2022-46315", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46315", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46315", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2489", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46315" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "VULHUB", "id": "VHN-444285" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46315", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023888", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2489", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444285", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444285" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "id": "VAR-202212-0527", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444285" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:46.692000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218947" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 2.4, "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "trust": 2.4, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46315" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202303-0000001529824505" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46315/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444285" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444285" }, { "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "db": "NVD", "id": "CVE-2022-46315" }, { "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444285" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "date": "2022-12-20T21:15:11.397000", "db": "NVD", "id": "CVE-2022-46315" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444285" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023888" }, { "date": "2023-11-07T03:55:33.690000", "db": "NVD", "id": "CVE-2022-46315" }, { "date": "2023-03-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2489" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2489" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023888" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2489" } ], "trust": 0.6 } }
var-202110-1389
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1389", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22452" } ] }, "cve": "CVE-2021-22452", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22452", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380887", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22452", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22452", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2042", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380887", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address", "sources": [ { "db": "NVD", "id": "CVE-2021-22452" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "VULHUB", "id": "VHN-380887" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22452", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014235", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2042", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380887", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "id": "VAR-202110-1389", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380887" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.405000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171457" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22452" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380887" }, { "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "db": "NVD", "id": "CVE-2021-22452" }, { "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380887" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "date": "2021-10-28T13:15:08.903000", "db": "NVD", "id": "CVE-2021-22452" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-29T00:00:00", "db": "VULHUB", "id": "VHN-380887" }, { "date": "2022-10-11T06:35:00", "db": "JVNDB", "id": "JVNDB-2021-014235" }, { "date": "2021-10-29T17:39:32.697000", "db": "NVD", "id": "CVE-2021-22452" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2042" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2042" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014235" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2042" } ], "trust": 0.6 } }
var-202112-0226
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product not validly validating the data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37094" } ] }, "cve": "CVE-2021-37094", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37094", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398930", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37094", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37094", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2027", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398930", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product not validly validating the data", "sources": [ { "db": "NVD", "id": "CVE-2021-37094" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "VULHUB", "id": "VHN-398930" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37094", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015941", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2027", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103537", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398930", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "id": "VAR-202112-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398930" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.254000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173504" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37094" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398930" }, { "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "db": "NVD", "id": "CVE-2021-37094" }, { "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398930" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "date": "2021-12-07T17:15:09.820000", "db": "NVD", "id": "CVE-2021-37094" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398930" }, { "date": "2022-12-05T01:26:00", "db": "JVNDB", "id": "JVNDB-2021-015941" }, { "date": "2021-12-09T17:34:41.927000", "db": "NVD", "id": "CVE-2021-37094" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015941" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2027" } ], "trust": 0.6 } }
var-202302-0316
Vulnerability from variot
The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48301" } ] }, "cve": "CVE-2022-48301", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48301", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48301", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-342", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48301", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003613", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-342", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453381", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48301", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "id": "VAR-202302-0316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453381" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:31.223000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225928" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48301" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48301/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453381" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48301" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "date": "2023-02-09T17:15:15.343000", "db": "NVD", "id": "CVE-2022-48301" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453381" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48301" }, { "date": "2023-09-14T07:25:00", "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "date": "2023-02-17T13:04:34.307000", "db": "NVD", "id": "CVE-2022-48301" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-342" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-342" } ], "trust": 0.6 } }
var-202108-0289
Vulnerability from variot
A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0289", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22423" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22423" } ] }, "cve": "CVE-2021-22423", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380858", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22423", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22423", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-321", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380858", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22423", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "NVD", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow", "sources": [ { "db": "NVD", "id": "CVE-2021-22423" }, { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22423", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-321", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380858", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22423", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "NVD", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "id": "VAR-202108-0289", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380858" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:20.842000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159485" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "NVD", "id": "CVE-2021-22423" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22423" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "NVD", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380858" }, { "db": "VULMON", "id": "CVE-2021-22423" }, { "db": "NVD", "id": "CVE-2021-22423" }, { "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380858" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22423" }, { "date": "2021-08-03T18:15:08.230000", "db": "NVD", "id": "CVE-2021-22423" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380858" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22423" }, { "date": "2021-08-10T21:24:09.697000", "db": "NVD", "id": "CVE-2021-22423" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-321" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-321" } ], "trust": 0.6 } }
var-202110-1869
Vulnerability from variot
Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. HarmonyOS for, SQL There is an injection vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1869", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39978" } ] }, "cve": "CVE-2021-39978", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39978", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401379", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39978", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39978", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2212", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401379", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. HarmonyOS for, SQL There is an injection vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39978", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2212", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401379", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39978", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "id": "VAR-202110-1869", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401379" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:23.692000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176760" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.1 }, { "problemtype": "SQL injection (CWE-89) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39978" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401379" }, { "db": "VULMON", "id": "CVE-2021-39978" }, { "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "db": "NVD", "id": "CVE-2021-39978" }, { "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401379" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39978" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "date": "2022-01-03T22:15:10.473000", "db": "NVD", "id": "CVE-2021-39978" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401379" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39978" }, { "date": "2023-01-27T03:26:00", "db": "JVNDB", "id": "JVNDB-2021-017588" }, { "date": "2022-01-13T15:44:20.833000", "db": "NVD", "id": "CVE-2021-39978" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2212" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0SQL\u00a0 Injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2212" } ], "trust": 0.6 } }
var-202108-0288
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22422" } ] }, "cve": "CVE-2021-22422", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22422", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380857", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22422", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22422", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-320", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380857", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22422", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" }, { "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22422", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009365", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-320", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380857", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22422", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" }, { "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "id": "VAR-202108-0288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380857" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:24.607000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159650" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22422" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" }, { "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380857" }, { "db": "VULMON", "id": "CVE-2021-22422" }, { "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "db": "NVD", "id": "CVE-2021-22422" }, { "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380857" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22422" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "date": "2021-08-03T18:15:08.193000", "db": "NVD", "id": "CVE-2021-22422" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380857" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22422" }, { "date": "2022-04-21T08:43:00", "db": "JVNDB", "id": "JVNDB-2021-009365" }, { "date": "2021-08-11T13:32:37.243000", "db": "NVD", "id": "CVE-2021-22422" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-320" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-320" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009365" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-320" } ], "trust": 0.6 } }
var-202111-0870
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0870", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37025" } ] }, "cve": "CVE-2021-37025", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37025", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398858", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37025", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37025", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1891", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398858", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37025" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "VULHUB", "id": "VHN-398858" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37025", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015563", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1891", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398858", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "id": "VAR-202111-0870", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398858" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.063000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172189" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37025" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398858" }, { "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "db": "NVD", "id": "CVE-2021-37025" }, { "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398858" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "date": "2021-11-23T16:15:09.583000", "db": "NVD", "id": "CVE-2021-37025" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398858" }, { "date": "2022-11-24T07:01:00", "db": "JVNDB", "id": "JVNDB-2021-015563" }, { "date": "2021-11-29T18:00:16.503000", "db": "NVD", "id": "CVE-2021-37025" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1891" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1891" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015563" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1891" } ], "trust": 0.6 } }
var-202301-0724
Vulnerability from variot
The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0724", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46762" } ] }, "cve": "CVE-2022-46762", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46762", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46762", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-437", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46762", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001769", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-437", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-447442", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-46762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "id": "VAR-202301-0724", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-447442" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:43.691000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221314" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46762" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46762/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-447442" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-46762" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "date": "2023-01-06T20:15:09.773000", "db": "NVD", "id": "CVE-2022-46762" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-447442" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-46762" }, { "date": "2023-05-09T01:48:00", "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "date": "2023-01-12T17:15:36.043000", "db": "NVD", "id": "CVE-2022-46762" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-437" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-437" } ], "trust": 0.6 } }
var-202211-0384
Vulnerability from variot
The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "cve": "CVE-2022-44552", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44552", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2122", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability", "sources": [ { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "VULHUB", "id": "VHN-441936" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44552", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2122", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441936", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "id": "VAR-202211-0384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441936" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:46.291000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214352" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44552/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441936" }, { "date": "2022-11-09T21:15:18.387000", "db": "NVD", "id": "CVE-2022-44552" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441936" }, { "date": "2022-11-14T19:15:20.207000", "db": "NVD", "id": "CVE-2022-44552" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 } }
var-202110-1868
Vulnerability from variot
Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1868", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39975" } ] }, "cve": "CVE-2021-39975", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39975", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401376", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39975", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39975", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2213", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401376", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39975", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017596", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2213", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401376", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39975", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "id": "VAR-202110-1868", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401376" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:41.547000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176761" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39975" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401376" }, { "db": "VULMON", "id": "CVE-2021-39975" }, { "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "db": "NVD", "id": "CVE-2021-39975" }, { "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401376" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39975" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "date": "2022-01-03T22:15:10.380000", "db": "NVD", "id": "CVE-2021-39975" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401376" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39975" }, { "date": "2023-01-27T06:34:00", "db": "JVNDB", "id": "JVNDB-2021-017596" }, { "date": "2022-01-13T16:02:44.597000", "db": "NVD", "id": "CVE-2021-39975" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2213" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017596" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2213" } ], "trust": 0.6 } }
var-202210-0122
Vulnerability from variot
The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0122", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38984" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38984" } ] }, "cve": "CVE-2022-38984", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38984", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-185", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "VULHUB", "id": "VHN-434763" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38984", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-185", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434763", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "id": "VAR-202210-0122", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434763" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:14.216000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211161" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38984/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434763" }, { "date": "2022-10-14T16:15:15.293000", "db": "NVD", "id": "CVE-2022-38984" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434763" }, { "date": "2022-10-18T15:04:27.097000", "db": "NVD", "id": "CVE-2022-38984" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 } }
var-202209-0200
Vulnerability from variot
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0200", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40024" } ] }, "cve": "CVE-2021-40024", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40024", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40024", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-217", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40024", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020314", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-217", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81254", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401425", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40024", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "id": "VAR-202209-0200", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401425" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:45.115000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208411" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40024" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40024/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401425" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40024" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "date": "2022-09-16T18:15:11.580000", "db": "NVD", "id": "CVE-2021-40024" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-401425" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40024" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "date": "2022-09-20T16:58:52.297000", "db": "NVD", "id": "CVE-2021-40024" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ], "trust": 0.6 } }
var-202110-1458
Vulnerability from variot
A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1458", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22461" } ] }, "cve": "CVE-2021-22461", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22461", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380896", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22461", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22461", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2053", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380896", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash", "sources": [ { "db": "NVD", "id": "CVE-2021-22461" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "VULHUB", "id": "VHN-380896" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22461", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014244", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2053", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380896", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "id": "VAR-202110-1458", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380896" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.527000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168200" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22461" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380896" }, { "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "db": "NVD", "id": "CVE-2021-22461" }, { "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380896" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "date": "2021-10-28T13:15:09.273000", "db": "NVD", "id": "CVE-2021-22461" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380896" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014244" }, { "date": "2021-11-01T19:46:24.063000", "db": "NVD", "id": "CVE-2021-22461" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2053" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2053" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in resource allocation without restrictions or throttling in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014244" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2053" } ], "trust": 0.6 } }
var-202212-0422
Vulnerability from variot
The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0422", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.0.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46310" } ] }, "cve": "CVE-2022-46310", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46310", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46310", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2491", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46310" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "VULHUB", "id": "VHN-444280" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46310", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023883", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2491", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444280", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444280" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "id": "VAR-202212-0422", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444280" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:46.784000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218948" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46310" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46310/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444280" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444280" }, { "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "db": "NVD", "id": "CVE-2022-46310" }, { "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444280" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "date": "2022-12-20T21:15:11.153000", "db": "NVD", "id": "CVE-2022-46310" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444280" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023883" }, { "date": "2022-12-24T04:13:18.860000", "db": "NVD", "id": "CVE-2022-46310" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2491" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2491" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023883" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2491" } ], "trust": 0.6 } }
var-202112-0346
Vulnerability from variot
There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37054" } ] }, "cve": "CVE-2021-37054", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37054", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398887", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37054", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37054", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398887", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37054", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015862", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398887", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "id": "VAR-202112-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:24.958000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Identity\u00a0spoofing\u00a0and\u00a0authentication\u00a0bypass\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173785" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37054" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-12-08T15:15:09.700000", "db": "NVD", "id": "CVE-2021-37054" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-12-09T17:52:37.077000", "db": "NVD", "id": "CVE-2021-37054" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 } }
var-202212-0767
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46322" } ] }, "cve": "CVE-2022-46322", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46322", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46322", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2526", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "VULHUB", "id": "VHN-444292" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46322", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024014", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2526", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444292", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "id": "VAR-202212-0767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444292" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:44.331000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218963" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46322" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46322/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444292" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "date": "2022-12-20T21:15:11.740000", "db": "NVD", "id": "CVE-2022-46322" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444292" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "date": "2022-12-24T04:17:30.480000", "db": "NVD", "id": "CVE-2022-46322" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ], "trust": 0.6 } }
var-202110-1442
Vulnerability from variot
A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion. HarmonyOS contains an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1442", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22450" } ] }, "cve": "CVE-2021-22450", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22450", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380885", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22450", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22450", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2040", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380885", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion. HarmonyOS contains an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22450" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "VULHUB", "id": "VHN-380885" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22450", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014240", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2040", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380885", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "id": "VAR-202110-1442", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380885" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:12.699000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168085" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22450" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380885" }, { "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "db": "NVD", "id": "CVE-2021-22450" }, { "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380885" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "date": "2021-10-28T13:15:08.813000", "db": "NVD", "id": "CVE-2021-22450" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380885" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014240" }, { "date": "2021-11-01T18:53:09.997000", "db": "NVD", "id": "CVE-2021-22450" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2040" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2040" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Incomplete Cleanup Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014240" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2040" } ], "trust": 0.6 } }
var-202111-0875
Vulnerability from variot
There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0875", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37018" } ] }, "cve": "CVE-2021-37018", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37018", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398850", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37018", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37018", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1886", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398850", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-37018" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "VULHUB", "id": "VHN-398850" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37018", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015581", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1886", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102854", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398850", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "id": "VAR-202111-0875", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398850" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.967000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172185" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37018" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398850" }, { "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "db": "NVD", "id": "CVE-2021-37018" }, { "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398850" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "date": "2021-11-23T16:15:09.367000", "db": "NVD", "id": "CVE-2021-37018" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398850" }, { "date": "2022-11-24T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-015581" }, { "date": "2021-11-29T18:59:42.433000", "db": "NVD", "id": "CVE-2021-37018" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1886" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1886" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015581" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1886" } ], "trust": 0.6 } }
var-202207-0181
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0181", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34735" } ] }, "cve": "CVE-2022-34735", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34735", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427082", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34735", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34735", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-408", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427082", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-34735", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34735", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013205", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-408", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52822", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427082", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34735", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "id": "VAR-202207-0181", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427082" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:23.344000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200885" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34735" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34735/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427082" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34735" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "date": "2022-07-12T14:15:19.260000", "db": "NVD", "id": "CVE-2022-34735" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427082" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34735" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "date": "2022-07-19T11:42:57.720000", "db": "NVD", "id": "CVE-2022-34735" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013205" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ], "trust": 0.6 } }
var-202111-0877
Vulnerability from variot
There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones contain a permission impropriety retention vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a permission configuration vulnerability in Huawei HarmonyOS. Attackers can exploit this vulnerability to affect user privacy
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0877", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37006" } ] }, "cve": "CVE-2021-37006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37006", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398837", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37006", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1875", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398837", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones contain a permission impropriety retention vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a permission configuration vulnerability in Huawei HarmonyOS. Attackers can exploit this vulnerability to affect user privacy", "sources": [ { "db": "NVD", "id": "CVE-2021-37006" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "VULHUB", "id": "VHN-398837" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37006", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015637", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1875", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102857", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398837", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "id": "VAR-202111-0877", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398837" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.944000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172174" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37006" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398837" }, { "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "db": "NVD", "id": "CVE-2021-37006" }, { "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398837" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "date": "2021-11-23T16:15:08.937000", "db": "NVD", "id": "CVE-2021-37006" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398837" }, { "date": "2022-11-28T05:13:00", "db": "JVNDB", "id": "JVNDB-2021-015637" }, { "date": "2021-11-29T18:48:23.287000", "db": "NVD", "id": "CVE-2021-37006" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1875" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1875" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Retention of Permissions Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015637" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1875" } ], "trust": 0.6 } }
var-202204-1111
Vulnerability from variot
The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1111", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22258" } ] }, "cve": "CVE-2022-22258", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22258", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409787", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22258", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22258", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-409787", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22258", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22258", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007942", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44621", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409787", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22258", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "id": "VAR-202204-1111", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409787" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:54:54.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189781" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22258" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22258/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-04-11T20:15:19.747000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-09-30T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-09-30T13:10:13.337000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 } }
var-202111-1781
Vulnerability from variot
The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1781", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39985" } ] }, "cve": "CVE-2021-39985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39985", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401386", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39985", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39985", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2125", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401386", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39985", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017728", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2125", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08313", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401386", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39985", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "id": "VAR-202111-1781", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401386" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.612000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176786" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39985" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401386" }, { "db": "VULMON", "id": "CVE-2021-39985" }, { "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "db": "NVD", "id": "CVE-2021-39985" }, { "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401386" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39985" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "date": "2022-01-03T22:15:10.843000", "db": "NVD", "id": "CVE-2021-39985" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401386" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39985" }, { "date": "2023-02-02T02:33:00", "db": "JVNDB", "id": "JVNDB-2021-017728" }, { "date": "2022-01-14T15:32:12.377000", "db": "NVD", "id": "CVE-2021-39985" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in array index validation in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017728" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2125" } ], "trust": 0.6 } }
var-202110-1865
Vulnerability from variot
Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability is due to a vulnerability in a component of HarmonyOS that is not strict enough for uri verification. Attackers can exploit this vulnerability to cause directory attack traversal, affecting confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1865", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37126" } ] }, "cve": "CVE-2021-37126", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37126", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398963", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37126", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37126", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2216", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398963", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability is due to a vulnerability in a component of HarmonyOS that is not strict enough for uri verification. Attackers can exploit this vulnerability to cause directory attack traversal, affecting confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37126", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017298", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2216", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04708", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398963", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37126", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "id": "VAR-202110-1865", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398963" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:32.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176764" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37126" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398963" }, { "db": "VULMON", "id": "CVE-2021-37126" }, { "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "db": "NVD", "id": "CVE-2021-37126" }, { "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398963" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37126" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "date": "2022-01-03T22:15:09.643000", "db": "NVD", "id": "CVE-2021-37126" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398963" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37126" }, { "date": "2023-01-13T05:53:00", "db": "JVNDB", "id": "JVNDB-2021-017298" }, { "date": "2022-01-11T20:04:44.400000", "db": "NVD", "id": "CVE-2021-37126" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2216" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2216" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017298" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2216" } ], "trust": 0.6 } }
var-202111-1765
Vulnerability from variot
Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1765", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37112" } ] }, "cve": "CVE-2021-37112", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37112", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398948", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37112", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37112", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-2135", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398948", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak. HarmonyOS Exists in a vulnerability in externally controllable references to resources in another region.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37112", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2135", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398948", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37112", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "id": "VAR-202111-1765", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398948" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:08.350000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176796" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.0 }, { "problemtype": "Externally controllable reference to another region resource (CWE-610) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-610", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37112" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398948" }, { "db": "VULMON", "id": "CVE-2021-37112" }, { "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "db": "NVD", "id": "CVE-2021-37112" }, { "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398948" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37112" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "date": "2022-01-03T22:15:09.113000", "db": "NVD", "id": "CVE-2021-37112" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398948" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37112" }, { "date": "2023-01-17T07:01:00", "db": "JVNDB", "id": "JVNDB-2021-017378" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37112" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2135" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2135" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in externally controllable references to resources in another region of", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2135" } ], "trust": 0.6 } }
var-202111-1769
Vulnerability from variot
There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1769", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39974" } ] }, "cve": "CVE-2021-39974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39974", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401375", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39974", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39974", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401375", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39974", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017604", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39974", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "id": "VAR-202111-1769", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401375" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:59.087000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39974" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2022-01-03T22:15:10.333000", "db": "NVD", "id": "CVE-2021-39974" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2022-01-13T15:52:46.770000", "db": "NVD", "id": "CVE-2021-39974" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 } }
var-202110-1858
Vulnerability from variot
HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file. HarmonyOS Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1858", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37128" } ] }, "cve": "CVE-2021-37128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37128", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398965", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37128", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37128", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398965", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file. HarmonyOS Exists in a past traversal vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37128", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017297", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2223", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08316", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398965", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37128", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "id": "VAR-202110-1858", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398965" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.739000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176771" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37128" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398965" }, { "db": "VULMON", "id": "CVE-2021-37128" }, { "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "db": "NVD", "id": "CVE-2021-37128" }, { "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398965" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37128" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "date": "2022-01-03T22:15:09.690000", "db": "NVD", "id": "CVE-2021-37128" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398965" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37128" }, { "date": "2023-01-13T05:46:00", "db": "JVNDB", "id": "JVNDB-2021-017297" }, { "date": "2022-01-11T20:05:38.820000", "db": "NVD", "id": "CVE-2021-37128" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2223" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017297" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2223" } ], "trust": 0.6 } }
var-202112-0242
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0242", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37073" } ] }, "cve": "CVE-2021-37073", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37073", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398907", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.7, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37073", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37073", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202109-2031", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-398907", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37073" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "VULHUB", "id": "VHN-398907" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37073", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015958", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2031", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398907", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "id": "VAR-202112-0242", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398907" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.313000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173508" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37073" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398907" }, { "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "db": "NVD", "id": "CVE-2021-37073" }, { "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398907" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "date": "2021-12-07T17:15:09.097000", "db": "NVD", "id": "CVE-2021-37073" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398907" }, { "date": "2022-12-05T02:41:00", "db": "JVNDB", "id": "JVNDB-2021-015958" }, { "date": "2021-12-09T17:36:45.333000", "db": "NVD", "id": "CVE-2021-37073" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2031" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015958" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2031" } ], "trust": 0.6 } }
var-202112-0349
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0349", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37051" } ] }, "cve": "CVE-2021-37051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37051", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398884", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37051", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398884", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015859", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398884", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "id": "VAR-202112-0349", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.199000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Out-of-bounds\u00a0read\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-12-08T15:15:09.533000", "db": "NVD", "id": "CVE-2021-37051" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-12-09T17:51:12.040000", "db": "NVD", "id": "CVE-2021-37051" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 } }
var-202107-1682
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1682", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22433" } ] }, "cve": "CVE-2021-22433", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22433", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380868", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22433", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22433", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380868", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22433", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018742", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "id": "VAR-202107-1682", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:15.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171989" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22433/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2022-02-25T19:15:10.157000", "db": "NVD", "id": "CVE-2021-22433" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T01:41:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2022-03-07T17:58:49.180000", "db": "NVD", "id": "CVE-2021-22433" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 } }
var-202211-0371
Vulnerability from variot
There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44563" } ] }, "cve": "CVE-2022-44563", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44563", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44563", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2126", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "VULHUB", "id": "VHN-441954" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44563", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020500", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2126", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441954", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "id": "VAR-202211-0371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441954" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:40.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213970" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44563" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44563/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441954" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "date": "2022-11-09T21:15:18.977000", "db": "NVD", "id": "CVE-2022-44563" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441954" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "date": "2022-11-10T13:56:16.547000", "db": "NVD", "id": "CVE-2022-44563" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Race condition vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ], "trust": 0.6 } }
var-202302-0469
Vulnerability from variot
The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0469", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48287" } ] }, "cve": "CVE-2022-48287", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48287", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48287", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-341", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48287", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003374", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-341", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453367", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "id": "VAR-202302-0469", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453367" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:31.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225743" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48287 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48287" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48287/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48287" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453367" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48287" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "date": "2023-02-09T17:15:12.450000", "db": "NVD", "id": "CVE-2022-48287" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453367" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48287" }, { "date": "2023-09-07T01:26:00", "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "date": "2023-02-16T14:20:03.613000", "db": "NVD", "id": "CVE-2022-48287" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-341" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-341" } ], "trust": 0.6 } }
var-202302-0393
Vulnerability from variot
The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0393", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48292" } ] }, "cve": "CVE-2022-48292", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48292", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48292", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202302-347", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48292", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-347", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453372", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48292", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "id": "VAR-202302-0393", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453372" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:16:55.699000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225748" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48292" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48292/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453372" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48292" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "date": "2023-02-09T17:15:13.260000", "db": "NVD", "id": "CVE-2022-48292" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453372" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48292" }, { "date": "2023-09-07T01:51:00", "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "date": "2023-02-16T19:12:13.887000", "db": "NVD", "id": "CVE-2022-48292" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-347" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-347" } ], "trust": 0.6 } }
var-202110-1457
Vulnerability from variot
A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1457", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22462" } ] }, "cve": "CVE-2021-22462", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22462", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380897", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22462", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22462", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2054", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380897", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22462", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash", "sources": [ { "db": "NVD", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22462", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014245", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2054", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380897", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22462", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "id": "VAR-202110-1457", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380897" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168201" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22462" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380897" }, { "db": "VULMON", "id": "CVE-2021-22462" }, { "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "db": "NVD", "id": "CVE-2021-22462" }, { "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380897" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22462" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "date": "2021-10-28T13:15:09.317000", "db": "NVD", "id": "CVE-2021-22462" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380897" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22462" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014245" }, { "date": "2021-11-01T19:28:24.997000", "db": "NVD", "id": "CVE-2021-22462" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2054" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2054" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014245" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2054" } ], "trust": 0.6 } }
var-202302-0346
Vulnerability from variot
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48300" } ] }, "cve": "CVE-2022-48300", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48300", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48300", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-343", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48300", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003403", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-343", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453380", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48300", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "id": "VAR-202302-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453380" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:41.797000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225744" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48300" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48300/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453380" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48300" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "date": "2023-02-09T17:15:15.057000", "db": "NVD", "id": "CVE-2022-48300" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453380" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48300" }, { "date": "2023-09-07T03:09:00", "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "date": "2023-02-16T20:10:12.937000", "db": "NVD", "id": "CVE-2022-48300" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-343" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-343" } ], "trust": 0.6 } }
var-202112-0259
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37011" } ] }, "cve": "CVE-2021-37011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 9.2, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.4, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37011", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.4, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398843", "impactScore": 9.2, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37011", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37011", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2061", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398843", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37011" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "VULHUB", "id": "VHN-398843" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37011", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015762", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2061", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398843", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "id": "VAR-202112-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398843" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:21.812000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173237" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37011" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398843" }, { "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "db": "NVD", "id": "CVE-2021-37011" }, { "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398843" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "date": "2021-12-07T17:15:08.213000", "db": "NVD", "id": "CVE-2021-37011" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398843" }, { "date": "2022-11-30T01:51:00", "db": "JVNDB", "id": "JVNDB-2021-015762" }, { "date": "2021-12-09T17:50:00.057000", "db": "NVD", "id": "CVE-2021-37011" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2061" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2061" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015762" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2061" } ], "trust": 0.6 } }
var-202205-0169
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the failure of hiaiserver to strictly verify the validity of the attributes in the model
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0169", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29789" } ] }, "cve": "CVE-2022-29789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29789", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421298", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29789", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29789", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2547", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421298", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the failure of hiaiserver to strictly verify the validity of the attributes in the model", "sources": [ { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29789", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009632", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2547", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53576", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421298", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29789", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "id": "VAR-202205-0169", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421298" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:42.688000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193768" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29789" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29789/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29789" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "date": "2022-05-13T15:15:09.743000", "db": "NVD", "id": "CVE-2022-29789" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29789" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "date": "2022-05-23T18:43:11.697000", "db": "NVD", "id": "CVE-2022-29789" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ], "trust": 0.6 } }
var-202209-0306
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38992" } ] }, "cve": "CVE-2022-38992", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38992", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38992", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38992", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016787", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428511", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "id": "VAR-202209-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.523000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208085" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38992" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38992/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-16T18:15:17.630000", "db": "NVD", "id": "CVE-2022-38992" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-17T03:46:53.047000", "db": "NVD", "id": "CVE-2022-38992" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 } }
var-202107-1681
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1681", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22431" } ] }, "cve": "CVE-2021-22431", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22431", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380866", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22431", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22431", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380866", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22431", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22431", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018744", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380866", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "id": "VAR-202107-1681", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380866" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:49.751000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171993" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22431" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22431/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2022-02-25T19:15:09.833000", "db": "NVD", "id": "CVE-2021-22431" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T01:45:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2022-03-07T17:57:53.880000", "db": "NVD", "id": "CVE-2021-22431" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 } }
var-202207-0068
Vulnerability from variot
The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0068", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34742" } ] }, "cve": "CVE-2022-34742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34742", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427079", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34742", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34742", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427079", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013198", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-61608", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427079", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "id": "VAR-202207-0068", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427079" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:42.681000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200888" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34742" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34742/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-07-12T14:15:19.533000", "db": "NVD", "id": "CVE-2022-34742" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-12-12T21:08:43.917000", "db": "NVD", "id": "CVE-2022-34742" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 } }
var-202110-1850
Vulnerability from variot
Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call. HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1850", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39981" } ] }, "cve": "CVE-2021-39981", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39981", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-401382", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39981", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39981", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2231", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401382", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call. HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39981", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2231", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08456", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401382", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39981", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "id": "VAR-202110-1850", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401382" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:26.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176779" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39981" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401382" }, { "db": "VULMON", "id": "CVE-2021-39981" }, { "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "db": "NVD", "id": "CVE-2021-39981" }, { "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401382" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39981" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "date": "2022-01-03T22:15:10.627000", "db": "NVD", "id": "CVE-2021-39981" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401382" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39981" }, { "date": "2023-01-27T03:16:00", "db": "JVNDB", "id": "JVNDB-2021-017585" }, { "date": "2022-01-13T19:21:58.607000", "db": "NVD", "id": "CVE-2021-39981" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2231" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2231" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2231" } ], "trust": 0.6 } }
var-202211-1082
Vulnerability from variot
The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1082", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44547" } ] }, "cve": "CVE-2022-44547", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44547", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44547", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2132", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "VULHUB", "id": "VHN-441926" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44547", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020506", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2132", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441926", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "id": "VAR-202211-1082", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441926" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:41.310000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213972" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44547" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44547/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441926" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "date": "2022-11-09T21:15:18.003000", "db": "NVD", "id": "CVE-2022-44547" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441926" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "date": "2022-11-10T13:50:42.190000", "db": "NVD", "id": "CVE-2022-44547" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ], "trust": 0.6 } }
var-202212-0487
Vulnerability from variot
A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0487", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46316" } ] }, "cve": "CVE-2022-46316", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46316", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46316", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2493", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46316" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "VULHUB", "id": "VHN-444286" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46316", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2493", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444286", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "id": "VAR-202212-0487", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444286" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:03.784000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218949" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46316" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46316/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444286" }, { "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "db": "NVD", "id": "CVE-2022-46316" }, { "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444286" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "date": "2022-12-20T21:15:11.443000", "db": "NVD", "id": "CVE-2022-46316" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444286" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023889" }, { "date": "2022-12-24T04:15:25.557000", "db": "NVD", "id": "CVE-2022-46316" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2493" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2493" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2493" } ], "trust": 0.6 } }
var-202211-0676
Vulnerability from variot
There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing. Huawei of HarmonyOS and EMUI There is a vulnerability in improper default permissions.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0676", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44548" } ] }, "cve": "CVE-2022-44548", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44548", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44548", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2131", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing. Huawei of HarmonyOS and EMUI There is a vulnerability in improper default permissions.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "VULHUB", "id": "VHN-441928" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44548", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020505", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441928", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "id": "VAR-202211-0676", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441928" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:13.303000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213635" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44548" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44548/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441928" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "date": "2022-11-09T21:15:18.067000", "db": "NVD", "id": "CVE-2022-44548" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441928" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "date": "2022-11-10T13:54:39.160000", "db": "NVD", "id": "CVE-2022-44548" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ], "trust": 0.6 } }
var-202110-1449
Vulnerability from variot
A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain. HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22470" } ] }, "cve": "CVE-2021-22470", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22470", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380905", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22470", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22470", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2064", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380905", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain. HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22470" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "VULHUB", "id": "VHN-380905" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22470", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014253", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380905", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "id": "VAR-202110-1449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380905" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:42.969000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171539" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22470" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380905" }, { "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "db": "NVD", "id": "CVE-2021-22470" }, { "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380905" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "date": "2021-10-28T13:15:09.663000", "db": "NVD", "id": "CVE-2021-22470" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380905" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014253" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22470" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2064" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2064" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014253" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2064" } ], "trust": 0.6 } }
var-202205-0439
Vulnerability from variot
The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0439", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46785" } ] }, "cve": "CVE-2021-46785", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46785", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-419297", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-46785", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46785", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202205-2544", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-419297", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46785", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009695", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2544", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-41788", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419297", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46785", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "id": "VAR-202205-0439", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419297" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:58.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=192868" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46785" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46785/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419297" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46785" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "date": "2022-05-13T15:15:08.410000", "db": "NVD", "id": "CVE-2021-46785" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-419297" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46785" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-46785" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ], "trust": 0.6 } }
var-202208-0888
Vulnerability from variot
Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0888", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40040" } ] }, "cve": "CVE-2021-40040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40040", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40040", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020146", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81251", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401441", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "id": "VAR-202208-0888", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:47.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204272" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40040/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-08-10T20:15:22.443000", "db": "NVD", "id": "CVE-2021-40040" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-10-27T19:04:30.717000", "db": "NVD", "id": "CVE-2021-40040" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 } }
var-202207-0110
Vulnerability from variot
The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0110", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34737" } ] }, "cve": "CVE-2022-34737", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34737", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427081", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34737", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34737", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-427081", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34737", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013203", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52821", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427081", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34737", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "id": "VAR-202207-0110", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427081" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:42.359000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199749" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34737" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34737/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-12T14:15:19.337000", "db": "NVD", "id": "CVE-2022-34737" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-19T12:23:31.947000", "db": "NVD", "id": "CVE-2022-34737" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 } }
var-202208-0704
Vulnerability from variot
The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0704", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40034" } ] }, "cve": "CVE-2021-40034", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40034", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40034", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40034", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020147", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401435", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "id": "VAR-202208-0704", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:55.625000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204204" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40034" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40034/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-10T20:15:22.397000", "db": "NVD", "id": "CVE-2021-40034" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-12T21:16:26.733000", "db": "NVD", "id": "CVE-2021-40034" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 } }
var-202112-0352
Vulnerability from variot
There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0352", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37045" } ] }, "cve": "CVE-2021-37045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37045", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398878", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37045", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37045", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398878", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37045", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015893", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398878", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "id": "VAR-202112-0352", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:39.367000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UAF\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173800" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2021-12-08T15:15:09.380000", "db": "NVD", "id": "CVE-2021-37045" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37045" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to use of freed memory in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 } }
var-202209-0254
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39004" } ] }, "cve": "CVE-2022-39004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39004", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39004", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64983", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39004", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "id": "VAR-202209-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428496" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:55.749000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208092" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39004" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39004/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-16T18:15:18.053000", "db": "NVD", "id": "CVE-2022-39004" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-21T12:43:01.093000", "db": "NVD", "id": "CVE-2022-39004" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 } }
var-202207-0974
Vulnerability from variot
Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0974", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40012" } ] }, "cve": "CVE-2021-40012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401413", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40012", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40012", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401413", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40012", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40012", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52818", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401413", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40012", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "id": "VAR-202207-0974", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401413" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:21.455000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=203734" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40012/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2022-07-12T14:15:14.680000", "db": "NVD", "id": "CVE-2021-40012" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40012" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 } }
var-202112-0235
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37081" } ] }, "cve": "CVE-2021-37081", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37081", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398916", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37081", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37081", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2029", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398916", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37081" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "VULHUB", "id": "VHN-398916" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37081", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015948", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2029", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01679", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398916", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "id": "VAR-202112-0235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398916" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:17.366000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173506" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37081" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398916" }, { "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "db": "NVD", "id": "CVE-2021-37081" }, { "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398916" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "date": "2021-12-07T17:15:09.353000", "db": "NVD", "id": "CVE-2021-37081" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398916" }, { "date": "2022-12-05T01:52:00", "db": "JVNDB", "id": "JVNDB-2021-015948" }, { "date": "2021-12-09T17:50:41.713000", "db": "NVD", "id": "CVE-2021-37081" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2029" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2029" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015948" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2029" } ], "trust": 0.6 } }
var-202112-0334
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0334", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37021" } ] }, "cve": "CVE-2021-37021", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37021", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398854", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37021", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37021", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398854", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37021", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015759", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398854", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "id": "VAR-202112-0334", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.191000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173232" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37021" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2021-12-07T17:15:08.343000", "db": "NVD", "id": "CVE-2021-37021" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T01:39:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37021" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 } }
var-202210-0380
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0380", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41600" } ] }, "cve": "CVE-2022-41600", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41600", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41600", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-152", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "VULHUB", "id": "VHN-437846" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41600", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018788", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-152", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437846", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "id": "VAR-202210-0380", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437846" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:01.457000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210786" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41600" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41600/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437846" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "date": "2022-10-14T16:15:28.970000", "db": "NVD", "id": "CVE-2022-41600" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437846" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "date": "2022-10-15T01:56:34.470000", "db": "NVD", "id": "CVE-2022-41600" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ], "trust": 0.6 } }
var-202212-0584
Vulnerability from variot
Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed. Successful exploitation of this vulnerability affects the smartphone availability. HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0584", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41590" } ] }, "cve": "CVE-2022-41590", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41590", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41590", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202212-2512", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed. Successful exploitation of this vulnerability affects the smartphone availability. HarmonyOS There is an authentication vulnerability in.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41590" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "VULHUB", "id": "VHN-437826" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41590", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003426", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2512", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437826", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "id": "VAR-202212-0584", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437826" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:36Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202212-0000001462975397", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=219373" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41590" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41590/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437826" }, { "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "db": "NVD", "id": "CVE-2022-41590" }, { "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437826" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "date": "2022-12-20T21:15:10.807000", "db": "NVD", "id": "CVE-2022-41590" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-29T00:00:00", "db": "VULHUB", "id": "VHN-437826" }, { "date": "2023-02-17T01:48:00", "db": "JVNDB", "id": "JVNDB-2022-003426" }, { "date": "2022-12-29T18:47:59.580000", "db": "NVD", "id": "CVE-2022-41590" }, { "date": "2022-12-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2512" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2512" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003426" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2512" } ], "trust": 0.6 } }
var-202204-0532
Vulnerability from variot
The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0532", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22253" } ] }, "cve": "CVE-2022-22253", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22253", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409782", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22253", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22253", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409782", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22253", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22253", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007945", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44623", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409782", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22253", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "id": "VAR-202204-0532", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409782" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:01.154000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189779" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-354", "trust": 1.1 }, { "problemtype": "Incomplete data integrity verification (CWE-354) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22253" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22253/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/354.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-11T20:15:19.523000", "db": "NVD", "id": "CVE-2022-22253" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-18T20:48:02.157000", "db": "NVD", "id": "CVE-2022-22253" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient data integrity verification in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 } }
var-202112-0947
Vulnerability from variot
The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0947", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40002" } ] }, "cve": "CVE-2021-40002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40002", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2022-05173", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401403", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40002", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-05173", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-211", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401403", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" }, { "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40002" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40002", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017520", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05173", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-211", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401403", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" }, { "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "id": "VAR-202112-0947", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" } ] }, "last_update_date": "2023-12-18T13:12:16.847000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315071" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172735" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40002" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" }, { "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05173" }, { "db": "VULHUB", "id": "VHN-401403" }, { "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "db": "NVD", "id": "CVE-2021-40002" }, { "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05173" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401403" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "date": "2022-01-10T14:10:21.047000", "db": "NVD", "id": "CVE-2021-40002" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05173" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401403" }, { "date": "2023-01-24T05:52:00", "db": "JVNDB", "id": "JVNDB-2021-017520" }, { "date": "2022-01-13T16:02:49.427000", "db": "NVD", "id": "CVE-2021-40002" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-211" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-211" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017520" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-211" } ], "trust": 0.6 } }
var-202112-0244
Vulnerability from variot
There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0244", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37071" } ] }, "cve": "CVE-2021-37071", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37071", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398905", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37071", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37071", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2032", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398905", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37071" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "VULHUB", "id": "VHN-398905" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37071", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015964", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2032", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398905", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "id": "VAR-202112-0244", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398905" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.306000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173509" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37071" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398905" }, { "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "db": "NVD", "id": "CVE-2021-37071" }, { "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398905" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "date": "2021-12-07T17:15:09.007000", "db": "NVD", "id": "CVE-2021-37071" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398905" }, { "date": "2022-12-05T02:52:00", "db": "JVNDB", "id": "JVNDB-2021-015964" }, { "date": "2021-12-09T17:37:41.137000", "db": "NVD", "id": "CVE-2021-37071" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2032" } ], "trust": 0.6 } }
var-202302-0317
Vulnerability from variot
The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0317", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48296" } ] }, "cve": "CVE-2022-48296", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48296", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48296", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202302-339", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48296", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003614", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-339", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453376", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "id": "VAR-202302-0317", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453376" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:02.123000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225927" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48296" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48296/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453376" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48296" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "date": "2023-02-09T17:15:14.337000", "db": "NVD", "id": "CVE-2022-48296" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453376" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48296" }, { "date": "2023-09-14T07:27:00", "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "date": "2023-02-17T13:20:07.597000", "db": "NVD", "id": "CVE-2022-48296" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-339" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-339" } ], "trust": 0.6 } }
var-202201-1717
Vulnerability from variot
The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1717", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40018" } ] }, "cve": "CVE-2021-40018", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40018", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401419", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40018", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40018", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-289", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401419", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" }, { "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-40018" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "VULHUB", "id": "VHN-401419" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40018", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-289", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401419", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" }, { "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "id": "VAR-202201-1717", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401419" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:36.940000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178001" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40018" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" }, { "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401419" }, { "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "db": "NVD", "id": "CVE-2021-40018" }, { "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401419" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "date": "2022-01-10T14:10:21.510000", "db": "NVD", "id": "CVE-2021-40018" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401419" }, { "date": "2023-01-24T03:25:00", "db": "JVNDB", "id": "JVNDB-2022-002889" }, { "date": "2022-01-13T03:09:44.180000", "db": "NVD", "id": "CVE-2021-40018" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-289" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-289" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-289" } ], "trust": 0.6 } }
var-202302-0455
Vulnerability from variot
The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0455", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48297" } ] }, "cve": "CVE-2022-48297", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48297", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48297", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-351", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48297", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-351", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453377", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48297", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "id": "VAR-202302-0455", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453377" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:14.668000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225752" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1284", "trust": 1.0 }, { "problemtype": "Improper validation of quantity specified in input (CWE-1284) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48297" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48297/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453377" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48297" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "date": "2023-02-09T17:15:14.490000", "db": "NVD", "id": "CVE-2022-48297" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453377" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48297" }, { "date": "2023-09-07T01:53:00", "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48297" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-351" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Validation of Quantities Specified in Inputs in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-351" } ], "trust": 0.6 } }
var-202112-0391
Vulnerability from variot
There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service. Huawei Smartphones have a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37061" } ] }, "cve": "CVE-2021-37061", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37061", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398895", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37061", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37061", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2034", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398895", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service. Huawei Smartphones have a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37061" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "VULHUB", "id": "VHN-398895" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37061", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016042", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2034", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398895", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "id": "VAR-202112-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398895" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.175000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173511" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37061" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398895" }, { "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "db": "NVD", "id": "CVE-2021-37061" }, { "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398895" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "date": "2021-12-07T17:15:08.633000", "db": "NVD", "id": "CVE-2021-37061" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-10T00:00:00", "db": "VULHUB", "id": "VHN-398895" }, { "date": "2022-12-05T07:27:00", "db": "JVNDB", "id": "JVNDB-2021-016042" }, { "date": "2021-12-10T20:07:02.807000", "db": "NVD", "id": "CVE-2021-37061" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2034" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Resource Exhaustion Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016042" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2034" } ], "trust": 0.6 } }
var-202206-0375
Vulnerability from variot
The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0375", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31763" } ] }, "cve": "CVE-2022-31763", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31763", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423596", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31763", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31763", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-478", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423596", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "VULHUB", "id": "VHN-423596" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31763", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-011276", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-478", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-47648", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423596", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "id": "VAR-202206-0375", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423596" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:25.268000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196702" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31763" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31763/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423596" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "date": "2022-06-13T15:15:10.530000", "db": "NVD", "id": "CVE-2022-31763" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423596" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "date": "2022-06-18T03:11:49.183000", "db": "NVD", "id": "CVE-2022-31763" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011276" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ], "trust": 0.6 } }
var-202209-0367
Vulnerability from variot
The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39001" } ] }, "cve": "CVE-2022-39001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39001", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017593", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434772", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "id": "VAR-202209-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434772" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.497000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208615" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39001" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39001/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-16T18:15:17.937000", "db": "NVD", "id": "CVE-2022-39001" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-21T12:30:08.660000", "db": "NVD", "id": "CVE-2022-39001" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Past traversal vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 } }
var-202112-0229
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0229", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37089" } ] }, "cve": "CVE-2021-37089", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37089", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398924", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37089", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37089", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2040", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398924", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37089" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "VULHUB", "id": "VHN-398924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37089", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016023", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2040", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103540", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "id": "VAR-202112-0229", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398924" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.297000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173797" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37089" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398924" }, { "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "db": "NVD", "id": "CVE-2021-37089" }, { "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398924" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "date": "2021-12-07T17:15:09.697000", "db": "NVD", "id": "CVE-2021-37089" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398924" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016023" }, { "date": "2021-12-09T18:27:10.083000", "db": "NVD", "id": "CVE-2021-37089" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2040" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2040" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016023" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2040" } ], "trust": 0.6 } }
var-202210-0367
Vulnerability from variot
The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "cve": "CVE-2022-39011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39011", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-183", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module", "sources": [ { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "VULHUB", "id": "VHN-434779" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39011", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-183", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434779", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "id": "VAR-202210-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434779" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:49.591000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211159" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39011/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434779" }, { "date": "2022-10-14T16:15:18.057000", "db": "NVD", "id": "CVE-2022-39011" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434779" }, { "date": "2022-10-18T17:37:02.827000", "db": "NVD", "id": "CVE-2022-39011" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 } }
var-202112-0351
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0351", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37049" } ] }, "cve": "CVE-2021-37049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37049", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398882", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37049", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37049", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398882", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015857", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398882", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "id": "VAR-202112-0351", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.544000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Heap-based\u00a0buffer\u00a0overflow\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173789" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-12-08T15:15:09.427000", "db": "NVD", "id": "CVE-2021-37049" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-12-09T17:59:57.660000", "db": "NVD", "id": "CVE-2021-37049" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 } }
var-202110-1448
Vulnerability from variot
A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1448", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22471" } ] }, "cve": "CVE-2021-22471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22471", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380906", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22471", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22471", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2065", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380906", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash", "sources": [ { "db": "NVD", "id": "CVE-2021-22471" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "VULHUB", "id": "VHN-380906" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22471", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014254", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2065", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380906", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "id": "VAR-202110-1448", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380906" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:16.140000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171547" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22471" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380906" }, { "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "db": "NVD", "id": "CVE-2021-22471" }, { "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380906" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "date": "2021-10-28T13:15:09.703000", "db": "NVD", "id": "CVE-2021-22471" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380906" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014254" }, { "date": "2021-11-01T19:14:57.820000", "db": "NVD", "id": "CVE-2021-22471" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2065" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2065" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014254" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2065" } ], "trust": 0.6 } }
var-202110-1861
Vulnerability from variot
Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications. HarmonyOS Exists in a permission management vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. Attackers can exploit this vulnerability to cause abnormal system functions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1861", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39982" } ] }, "cve": "CVE-2021-39982", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39982", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401383", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39982", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39982", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2220", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401383", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications. HarmonyOS Exists in a permission management vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. Attackers can exploit this vulnerability to cause abnormal system functions", "sources": [ { "db": "NVD", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39982", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017584", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2220", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08345", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401383", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39982", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "id": "VAR-202110-1861", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401383" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.196000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176768" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39982" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401383" }, { "db": "VULMON", "id": "CVE-2021-39982" }, { "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "db": "NVD", "id": "CVE-2021-39982" }, { "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401383" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39982" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "date": "2022-01-03T22:15:10.687000", "db": "NVD", "id": "CVE-2021-39982" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401383" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39982" }, { "date": "2023-01-27T03:12:00", "db": "JVNDB", "id": "JVNDB-2021-017584" }, { "date": "2022-01-13T19:28:23.277000", "db": "NVD", "id": "CVE-2021-39982" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2220" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2220" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in privilege management in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2220" } ], "trust": 0.6 } }
var-202206-0261
Vulnerability from variot
The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31751" } ] }, "cve": "CVE-2022-31751", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31751", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423584", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31751", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31751", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423584", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31751", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31751", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011284", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423584", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31751", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "id": "VAR-202206-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423584" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:40.662000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195992" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31751" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31751/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-06-13T15:15:10.047000", "db": "NVD", "id": "CVE-2022-31751" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-10-05T15:16:52.523000", "db": "NVD", "id": "CVE-2022-31751" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 } }
var-202110-1854
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1854", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37119" } ] }, "cve": "CVE-2021-37119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398955", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37119", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37119", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398955", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37119", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017299", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04709", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398955", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "id": "VAR-202110-1854", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398955" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.744000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176775" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37119" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2022-01-03T22:15:09.450000", "db": "NVD", "id": "CVE-2021-37119" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T06:15:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2022-01-11T19:58:15.363000", "db": "NVD", "id": "CVE-2021-37119" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 } }
var-202110-1860
Vulnerability from variot
Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to obtain the IMSI by bypassing the necessary permissions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1860", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39980" } ] }, "cve": "CVE-2021-39980", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39980", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401381", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-39980", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39980", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2221", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401381", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to obtain the IMSI by bypassing the necessary permissions", "sources": [ { "db": "NVD", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39980", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2221", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08457", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401381", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39980", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "id": "VAR-202110-1860", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401381" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.800000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176769" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39980" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401381" }, { "db": "VULMON", "id": "CVE-2021-39980" }, { "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "db": "NVD", "id": "CVE-2021-39980" }, { "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401381" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39980" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "date": "2022-01-03T22:15:10.570000", "db": "NVD", "id": "CVE-2021-39980" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401381" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39980" }, { "date": "2023-01-27T03:19:00", "db": "JVNDB", "id": "JVNDB-2021-017586" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-39980" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2221" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2221" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding information leakage in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2221" } ], "trust": 0.6 } }
var-202212-0382
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0382", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46325" } ] }, "cve": "CVE-2022-46325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46325", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46325", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2514", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "VULHUB", "id": "VHN-444295" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46325", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024018", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2514", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "id": "VAR-202212-0382", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444295" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:03.880000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218960" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46325" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46325/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444295" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "date": "2022-12-20T21:15:11.887000", "db": "NVD", "id": "CVE-2022-46325" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444295" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "date": "2022-12-24T04:17:17.677000", "db": "NVD", "id": "CVE-2022-46325" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ], "trust": 0.6 } }
var-202112-0333
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0333", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37043" } ] }, "cve": "CVE-2021-37043", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37043", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398876", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37043", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37043", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398876", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37043", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015758", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398876", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "id": "VAR-202112-0333", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:00.491000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173239" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37043" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-12-07T17:15:08.387000", "db": "NVD", "id": "CVE-2021-37043" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T01:35:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-12-09T17:48:30.133000", "db": "NVD", "id": "CVE-2021-37043" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 } }
var-202110-1862
Vulnerability from variot
PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed. HarmonyOS There is an input validation vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1862", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37116" } ] }, "cve": "CVE-2021-37116", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37116", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398952", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37116", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37116", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2219", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398952", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed. HarmonyOS There is an input validation vulnerability in.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37116", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017312", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2219", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398952", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37116", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "id": "VAR-202110-1862", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398952" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:04.828000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176767" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37116" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398952" }, { "db": "VULMON", "id": "CVE-2021-37116" }, { "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "db": "NVD", "id": "CVE-2021-37116" }, { "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398952" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37116" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "date": "2022-01-03T22:15:09.287000", "db": "NVD", "id": "CVE-2021-37116" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398952" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37116" }, { "date": "2023-01-13T06:31:00", "db": "JVNDB", "id": "JVNDB-2021-017312" }, { "date": "2022-01-11T19:44:30.417000", "db": "NVD", "id": "CVE-2021-37116" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2219" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2219" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017312" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2219" } ], "trust": 0.6 } }
var-202301-0474
Vulnerability from variot
The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0474", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46761" } ] }, "cve": "CVE-2022-46761", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46761", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46761", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-439", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46761", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001770", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-439", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-447441", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-46761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "id": "VAR-202301-0474", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-447441" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:38.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221316" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46761" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46761/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-447441" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-46761" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "date": "2023-01-06T20:15:09.707000", "db": "NVD", "id": "CVE-2022-46761" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-447441" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-46761" }, { "date": "2023-05-09T01:55:00", "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "date": "2023-01-12T17:09:45.867000", "db": "NVD", "id": "CVE-2022-46761" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-439" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-439" } ], "trust": 0.6 } }
var-202203-0964
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40048" } ] }, "cve": "CVE-2021-40048", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40048", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401449", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40048", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40048", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401449", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40048", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018716", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401449", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "id": "VAR-202203-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:49.734000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185902" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40048" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40048/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-10T17:43:17.003000", "db": "NVD", "id": "CVE-2021-40048" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-14T15:35:36.367000", "db": "NVD", "id": "CVE-2021-40048" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 } }
var-202112-0228
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphone products contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0228", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37090" } ] }, "cve": "CVE-2021-37090", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37090", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398926", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37090", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37090", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2003", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398926", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphone products contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37090" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "VULHUB", "id": "VHN-398926" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37090", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016024", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2003", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103539", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398926", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "id": "VAR-202112-0228", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398926" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.232000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173783" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37090" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398926" }, { "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "db": "NVD", "id": "CVE-2021-37090" }, { "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398926" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "date": "2021-12-07T17:15:09.740000", "db": "NVD", "id": "CVE-2021-37090" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398926" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016024" }, { "date": "2021-12-09T18:16:43.410000", "db": "NVD", "id": "CVE-2021-37090" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2003" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2003" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016024" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2003" } ], "trust": 0.6 } }
var-202206-0002
Vulnerability from variot
HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46811" } ] }, "cve": "CVE-2021-46811", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46811", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423544", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-46811", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46811", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423544", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information", "sources": [ { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46811", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012101", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51605", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423544", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "id": "VAR-202206-0002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423544" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:22.574000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46811" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46811/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-13T16:15:08.080000", "db": "NVD", "id": "CVE-2021-46811" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-27T16:09:54.217000", "db": "NVD", "id": "CVE-2021-46811" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 } }
var-202112-0946
Vulnerability from variot
The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0946", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40000" } ] }, "cve": "CVE-2021-40000", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40000", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2022-05172", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401401", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40000", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40000", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-05172", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-212", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401401", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" }, { "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40000" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40000", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017441", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-212", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-05172", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401401", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" }, { "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "id": "VAR-202112-0946", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" } ] }, "last_update_date": "2023-12-18T13:27:30.283000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability (CNVD-2022-05172)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315086" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172736" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40000" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" }, { "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05172" }, { "db": "VULHUB", "id": "VHN-401401" }, { "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "db": "NVD", "id": "CVE-2021-40000" }, { "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05172" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401401" }, { "date": "2023-01-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "date": "2022-01-10T14:10:20.937000", "db": "NVD", "id": "CVE-2021-40000" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05172" }, { "date": "2022-01-12T00:00:00", "db": "VULHUB", "id": "VHN-401401" }, { "date": "2023-01-18T06:06:00", "db": "JVNDB", "id": "JVNDB-2021-017441" }, { "date": "2022-01-12T21:35:33.953000", "db": "NVD", "id": "CVE-2021-40000" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-212" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017441" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-212" } ], "trust": 0.6 } }
var-202108-0283
Vulnerability from variot
A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos. HarmonyOS Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0283", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22419" } ] }, "cve": "CVE-2021-22419", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22419", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380854", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22419", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22419", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-316", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380854", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22419", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" }, { "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos. HarmonyOS Exists in an inadequate validation of data reliability vulnerabilities.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22419", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009371", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-316", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380854", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22419", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" }, { "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "id": "VAR-202108-0283", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380854" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:14.644000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159647" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22419" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/345.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" }, { "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380854" }, { "db": "VULMON", "id": "CVE-2021-22419" }, { "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "db": "NVD", "id": "CVE-2021-22419" }, { "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380854" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22419" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "date": "2021-08-03T18:15:08.090000", "db": "NVD", "id": "CVE-2021-22419" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380854" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22419" }, { "date": "2022-04-21T08:58:00", "db": "JVNDB", "id": "JVNDB-2021-009371" }, { "date": "2021-08-11T13:29:31.587000", "db": "NVD", "id": "CVE-2021-22419" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-316" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-316" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability for inadequate validation of data reliability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009371" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-316" } ], "trust": 0.6 } }
var-202110-1504
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1504", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22457" } ] }, "cve": "CVE-2021-22457", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22457", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380892", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22457", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22457", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202110-2047", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380892", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write", "sources": [ { "db": "NVD", "id": "CVE-2021-22457" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "VULHUB", "id": "VHN-380892" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22457", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014243", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2047", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380892", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "id": "VAR-202110-1504", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380892" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:00.588000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171491" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22457" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380892" }, { "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "db": "NVD", "id": "CVE-2021-22457" }, { "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380892" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "date": "2021-10-28T13:15:09.107000", "db": "NVD", "id": "CVE-2021-22457" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380892" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014243" }, { "date": "2021-11-01T20:19:16.900000", "db": "NVD", "id": "CVE-2021-22457" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2047" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2047" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014243" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2047" } ], "trust": 0.6 } }
var-202109-1958
Vulnerability from variot
The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1958", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22480" } ] }, "cve": "CVE-2021-22480", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22480", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380915", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22480", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22480", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2054", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380915", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow. HarmonyOS Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22480" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "VULHUB", "id": "VHN-380915" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22480", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018972", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2054", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380915", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "id": "VAR-202109-1958", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380915" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:26.866000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171912" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22480" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22480/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380915" }, { "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "db": "NVD", "id": "CVE-2021-22480" }, { "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380915" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "date": "2022-02-25T19:15:11.207000", "db": "NVD", "id": "CVE-2021-22480" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-380915" }, { "date": "2023-07-12T07:27:00", "db": "JVNDB", "id": "JVNDB-2021-018972" }, { "date": "2022-03-08T13:51:37.170000", "db": "NVD", "id": "CVE-2021-22480" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2054" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2054" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018972" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2054" } ], "trust": 0.6 } }
var-202110-1246
Vulnerability from variot
A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1246", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22453" } ] }, "cve": "CVE-2021-22453", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22453", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380888", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22453", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22453", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202110-2043", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380888", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22453" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "VULHUB", "id": "VHN-380888" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22453", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014234", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2043", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380888", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "id": "VAR-202110-1246", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380888" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:41.063000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171463" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22453" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380888" }, { "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "db": "NVD", "id": "CVE-2021-22453" }, { "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380888" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "date": "2021-10-28T13:15:08.947000", "db": "NVD", "id": "CVE-2021-22453" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380888" }, { "date": "2022-10-11T06:28:00", "db": "JVNDB", "id": "JVNDB-2021-014234" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22453" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2043" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2043" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014234" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2043" } ], "trust": 0.6 } }
var-202205-0437
Vulnerability from variot
The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0437", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29794" } ] }, "cve": "CVE-2022-29794", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-29794", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-421303", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29794", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29794", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202205-2552", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-421303", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel", "sources": [ { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29794", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009627", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2552", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47652", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421303", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29794", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "id": "VAR-202205-0437", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421303" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:42.161000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193773" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29794" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29794/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421303" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29794" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "date": "2022-05-13T15:15:09.980000", "db": "NVD", "id": "CVE-2022-29794" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421303" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29794" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "date": "2022-05-23T18:40:33.860000", "db": "NVD", "id": "CVE-2022-29794" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009627" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ], "trust": 0.6 } }
var-202112-0354
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0354", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37039" } ] }, "cve": "CVE-2021-37039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37039", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-398872", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37039", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37039", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398872", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08330", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398872", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "id": "VAR-202112-0354", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:00.458000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Input\u00a0verification\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-12-08T15:15:09.210000", "db": "NVD", "id": "CVE-2021-37039" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-12-09T17:52:24.587000", "db": "NVD", "id": "CVE-2021-37039" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 } }
var-202112-0355
Vulnerability from variot
There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0355", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37037" } ] }, "cve": "CVE-2021-37037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37037", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398870", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37037", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398870", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398870", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "id": "VAR-202112-0355", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.167000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Invalid\u00a0address\u00a0access\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173802" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-12-08T15:15:09.147000", "db": "NVD", "id": "CVE-2021-37037" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-12-09T17:51:40.283000", "db": "NVD", "id": "CVE-2021-37037" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 } }
var-202201-1068
Vulnerability from variot
The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1068", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40032" } ] }, "cve": "CVE-2021-40032", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40032", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401433", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40032", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40032", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-272", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401433", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" }, { "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2021-40032" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "VULHUB", "id": "VHN-401433" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40032", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002895", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-272", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08451", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401433", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" }, { "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "id": "VAR-202201-1068", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401433" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:33.885000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=177992" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "trust": 1.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40032" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202307-0000001587168858" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" }, { "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401433" }, { "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "db": "NVD", "id": "CVE-2021-40032" }, { "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401433" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "date": "2022-01-10T14:10:22.200000", "db": "NVD", "id": "CVE-2021-40032" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401433" }, { "date": "2023-01-25T07:36:00", "db": "JVNDB", "id": "JVNDB-2022-002895" }, { "date": "2023-07-06T14:15:10.450000", "db": "NVD", "id": "CVE-2021-40032" }, { "date": "2023-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-272" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-272" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002895" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-272" } ], "trust": 0.6 } }
var-202209-0142
Vulnerability from variot
The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0142", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39009" } ] }, "cve": "CVE-2022-39009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39009", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39009", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-159", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39009", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-159", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434776", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39009", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "id": "VAR-202209-0142", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434776" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.989000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208614" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39009" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39009/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434776" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39009" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "date": "2022-09-16T18:15:18.250000", "db": "NVD", "id": "CVE-2022-39009" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434776" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39009" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "date": "2022-09-21T14:03:03.557000", "db": "NVD", "id": "CVE-2022-39009" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ], "trust": 0.6 } }
var-202211-0419
Vulnerability from variot
The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0419", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "cve": "CVE-2022-44555", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44555", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2121", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable", "sources": [ { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "VULHUB", "id": "VHN-441942" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44555", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2121", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441942", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "id": "VAR-202211-0419", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441942" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:29.965000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214351" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44555/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441942" }, { "date": "2022-11-09T21:15:18.557000", "db": "NVD", "id": "CVE-2022-44555" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441942" }, { "date": "2022-11-14T19:11:28.647000", "db": "NVD", "id": "CVE-2022-44555" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 } }
var-202112-0227
Vulnerability from variot
There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in HUAWEI HarmonyOS, which can be exploited by attackers to affect confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37091" } ] }, "cve": "CVE-2021-37091", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37091", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398927", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37091", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37091", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2039", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398927", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There are security vulnerabilities in HUAWEI HarmonyOS, which can be exploited by attackers to affect confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37091" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "VULHUB", "id": "VHN-398927" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37091", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016025", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2039", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103538", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398927", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "id": "VAR-202112-0227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398927" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.651000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173796" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37091" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398927" }, { "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "db": "NVD", "id": "CVE-2021-37091" }, { "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398927" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "date": "2021-12-07T17:15:09.780000", "db": "NVD", "id": "CVE-2021-37091" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398927" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016025" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37091" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2039" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2039" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016025" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2039" } ], "trust": 0.6 } }
var-202206-0024
Vulnerability from variot
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31760" } ] }, "cve": "CVE-2022-31760", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31760", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423593", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31760", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31760", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-423593", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31760", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator", "sources": [ { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31760", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66176", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423593", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "id": "VAR-202206-0024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423593" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:05.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198079" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31760" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31760/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-13T16:15:08.770000", "db": "NVD", "id": "CVE-2022-31760" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-27T16:15:59.833000", "db": "NVD", "id": "CVE-2022-31760" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 } }
var-202205-0114
Vulnerability from variot
The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0114", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46787" } ] }, "cve": "CVE-2021-46787", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46787", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46787", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46787", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419299", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46787", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009693", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-419299", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "id": "VAR-202205-0114", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419299" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:43.564000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193776" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46787" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46787/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-13T15:15:08.523000", "db": "NVD", "id": "CVE-2021-46787" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-23T18:47:27.837000", "db": "NVD", "id": "CVE-2021-46787" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 } }
var-202210-0126
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0126", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41603" } ] }, "cve": "CVE-2022-41603", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41603", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41603", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-159", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "VULHUB", "id": "VHN-437851" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41603", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018785", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-159", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437851", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "id": "VAR-202210-0126", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437851" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:42.536000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210793" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41603" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41603/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437851" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "date": "2022-10-14T16:15:30.267000", "db": "NVD", "id": "CVE-2022-41603" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437851" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "date": "2022-10-15T01:58:15.223000", "db": "NVD", "id": "CVE-2022-41603" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ], "trust": 0.6 } }
var-202207-0132
Vulnerability from variot
The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0132", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "cve": "CVE-2021-46741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418650", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46741", "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46741", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418650", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46741", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57613", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418650", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "id": "VAR-202207-0132", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418650" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:38.800000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200693" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46741/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-07-12T14:15:14.857000", "db": "NVD", "id": "CVE-2021-46741" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-12-12T21:08:02.043000", "db": "NVD", "id": "CVE-2021-46741" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 } }
var-202211-0418
Vulnerability from variot
The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0418", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "cve": "CVE-2022-44560", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44560", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2125", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified", "sources": [ { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "VULHUB", "id": "VHN-441950" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44560", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2125", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441950", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "id": "VAR-202211-0418", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441950" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:27.207000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213629" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44560/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441950" }, { "date": "2022-11-09T21:15:18.803000", "db": "NVD", "id": "CVE-2022-44560" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-17T00:00:00", "db": "VULHUB", "id": "VHN-441950" }, { "date": "2022-11-17T15:16:33.273000", "db": "NVD", "id": "CVE-2022-44560" }, { "date": "2022-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 } }
var-202210-0348
Vulnerability from variot
The fingerprint module has service logic errors.Successful exploitation of this vulnerability will cause the phone lock to be cracked
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38982" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38982" } ] }, "cve": "CVE-2022-38982", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38982", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-165", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38982" }, { "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint module has service logic errors.Successful exploitation of this vulnerability will cause the phone lock to be cracked", "sources": [ { "db": "NVD", "id": "CVE-2022-38982" }, { "db": "VULHUB", "id": "VHN-434761" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38982", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-165", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434761" }, { "db": "NVD", "id": "CVE-2022-38982" }, { "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "id": "VAR-202210-0348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434761" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:56.687000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211447" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38982" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38982/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434761" }, { "db": "NVD", "id": "CVE-2022-38982" }, { "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434761" }, { "db": "NVD", "id": "CVE-2022-38982" }, { "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434761" }, { "date": "2022-10-14T16:15:14.433000", "db": "NVD", "id": "CVE-2022-38982" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-20T00:00:00", "db": "VULHUB", "id": "VHN-434761" }, { "date": "2022-10-20T13:04:53.943000", "db": "NVD", "id": "CVE-2022-38982" }, { "date": "2022-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-165" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-165" } ], "trust": 0.6 } }
var-202111-1770
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1770", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39969" } ] }, "cve": "CVE-2021-39969", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39969", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401370", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39969", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39969", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401370", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39969", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017612", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401370", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39969", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "id": "VAR-202111-1770", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401370" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39969" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2022-01-03T22:15:10.093000", "db": "NVD", "id": "CVE-2021-39969" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T07:14:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-39969" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource leakage to the wrong area in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 } }
var-202209-0368
Vulnerability from variot
The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39010" } ] }, "cve": "CVE-2022-39010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39010", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39010", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-158", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39010", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017584", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-158", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434778", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39010", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "id": "VAR-202209-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434778" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.566000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208075" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39010/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434778" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39010" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "date": "2022-09-16T18:15:18.287000", "db": "NVD", "id": "CVE-2022-39010" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434778" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39010" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "date": "2022-09-21T14:04:30.277000", "db": "NVD", "id": "CVE-2022-39010" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ], "trust": 0.6 } }
var-202209-1094
Vulnerability from variot
Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1094", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39002" } ] }, "cve": "CVE-2022-39002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434773", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "id": "VAR-202209-1094", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434773" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:13.512000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=209481" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39002" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39002/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-09-16T18:15:17.977000", "db": "NVD", "id": "CVE-2022-39002" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-03T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-11-03T20:43:29.643000", "db": "NVD", "id": "CVE-2022-39002" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 } }
var-202209-0152
Vulnerability from variot
The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0152", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39007" } ] }, "cve": "CVE-2022-39007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39007", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39007", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-164", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39007", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-164", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434775", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39007", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "id": "VAR-202209-0152", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434775" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:03.618000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208616" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39007" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39007/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434775" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39007" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "date": "2022-09-16T18:15:18.170000", "db": "NVD", "id": "CVE-2022-39007" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434775" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39007" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-39007" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ], "trust": 0.6 } }
var-202111-0849
Vulnerability from variot
There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0849", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37012" } ] }, "cve": "CVE-2021-37012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37012", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398844", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37012", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37012", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1880", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398844", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37012" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "VULHUB", "id": "VHN-398844" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37012", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1880", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398844", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "id": "VAR-202111-0849", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398844" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.087000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172179" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37012" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398844" }, { "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "db": "NVD", "id": "CVE-2021-37012" }, { "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398844" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "date": "2021-11-23T16:15:09.157000", "db": "NVD", "id": "CVE-2021-37012" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398844" }, { "date": "2022-11-24T09:11:00", "db": "JVNDB", "id": "JVNDB-2021-015587" }, { "date": "2021-11-29T15:31:18.310000", "db": "NVD", "id": "CVE-2021-37012" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1880" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1880" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1880" } ], "trust": 0.6 } }
var-202110-1857
Vulnerability from variot
Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components. HarmonyOS There is a race condition vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1857", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37134" } ] }, "cve": "CVE-2021-37134", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37134", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398970", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37134", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37134", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2224", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398970", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components. HarmonyOS There is a race condition vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37134", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017617", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2224", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14784", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398970", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37134", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "id": "VAR-202110-1857", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398970" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:00.435000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176772" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37134" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398970" }, { "db": "VULMON", "id": "CVE-2021-37134" }, { "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "db": "NVD", "id": "CVE-2021-37134" }, { "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398970" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37134" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "date": "2022-01-03T22:15:09.857000", "db": "NVD", "id": "CVE-2021-37134" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398970" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37134" }, { "date": "2023-01-27T07:36:00", "db": "JVNDB", "id": "JVNDB-2021-017617" }, { "date": "2022-01-13T16:18:19.047000", "db": "NVD", "id": "CVE-2021-37134" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2224" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2224" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Race condition vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017617" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2224" } ], "trust": 0.6 } }
var-202210-1039
Vulnerability from variot
The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-1039", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "cve": "CVE-2022-38986", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38986", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-954", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability", "sources": [ { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "VULHUB", "id": "VHN-434765" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38986", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-954", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434765", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "id": "VAR-202210-1039", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434765" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:31.270000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211185" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38986/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434765" }, { "date": "2022-10-14T16:15:16.187000", "db": "NVD", "id": "CVE-2022-38986" }, { "date": "2022-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434765" }, { "date": "2022-10-18T15:43:11.597000", "db": "NVD", "id": "CVE-2022-38986" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 } }
var-202211-0327
Vulnerability from variot
The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "cve": "CVE-2022-44553", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44553", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2128", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically", "sources": [ { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "VULHUB", "id": "VHN-441938" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44553", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2128", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441938", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "id": "VAR-202211-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441938" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:26:59.570000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213632" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44553/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441938" }, { "date": "2022-11-09T21:15:18.447000", "db": "NVD", "id": "CVE-2022-44553" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441938" }, { "date": "2022-11-14T19:13:52.980000", "db": "NVD", "id": "CVE-2022-44553" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 } }
var-202212-0383
Vulnerability from variot
The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0383", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41599" } ] }, "cve": "CVE-2022-41599", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41599", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41599", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2499", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "VULHUB", "id": "VHN-437842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41599", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023882", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2499", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "id": "VAR-202212-0383", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437842" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:18.733000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218953" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41599" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41599/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437842" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "date": "2022-12-20T21:15:10.957000", "db": "NVD", "id": "CVE-2022-41599" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-437842" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "date": "2022-12-24T04:13:01.250000", "db": "NVD", "id": "CVE-2022-41599" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ], "trust": 0.6 } }
var-202108-2287
Vulnerability from variot
There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22395" } ] }, "cve": "CVE-2021-22395", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22395", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380830", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22395", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22395", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380830", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22395", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380830", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "id": "VAR-202108-2287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:20.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172026" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22395" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22395/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2022-02-25T19:15:09.070000", "db": "NVD", "id": "CVE-2021-22395" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T08:27:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2022-03-07T17:44:53.277000", "db": "NVD", "id": "CVE-2021-22395" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 } }
var-202211-0894
Vulnerability from variot
The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0894", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44550" } ] }, "cve": "CVE-2022-44550", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44550", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44550", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2120", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "VULHUB", "id": "VHN-441932" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44550", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020503", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2120", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441932", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "id": "VAR-202211-0894", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441932" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:11.630000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213969" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.0 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44550" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44550/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441932" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "date": "2022-11-09T21:15:18.230000", "db": "NVD", "id": "CVE-2022-44550" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441932" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44550" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ], "trust": 0.6 } }
var-202201-1042
Vulnerability from variot
There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1042", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40037" } ] }, "cve": "CVE-2021-40037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40037", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-401438", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40037", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401438", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002909", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04994", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401438", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "id": "VAR-202201-1042", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:05.119000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177445" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-10T14:10:22.520000", "db": "NVD", "id": "CVE-2021-40037" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-13T15:33:36.160000", "db": "NVD", "id": "CVE-2021-40037" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 } }
var-202302-0468
Vulnerability from variot
The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0468", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48293" } ] }, "cve": "CVE-2022-48293", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48293", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48293", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202302-345", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48293", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003379", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-345", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453373", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48293", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "id": "VAR-202302-0468", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453373" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:13.108000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225746" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48293" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48293/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453373" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48293" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "date": "2023-02-09T17:15:13.450000", "db": "NVD", "id": "CVE-2022-48293" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453373" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48293" }, { "date": "2023-09-07T01:52:00", "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "date": "2023-02-16T19:20:47.607000", "db": "NVD", "id": "CVE-2022-48293" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-345" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-345" } ], "trust": 0.6 } }
var-202210-0466
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0466", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41595" } ] }, "cve": "CVE-2022-41595", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41595", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41595", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-155", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "VULHUB", "id": "VHN-437835" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41595", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018791", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-155", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437835", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "id": "VAR-202210-0466", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437835" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:39.634000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210789" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "CWE-476", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41595" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41595/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437835" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "date": "2022-10-14T16:15:27.523000", "db": "NVD", "id": "CVE-2022-41595" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437835" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2022-41595" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ], "trust": 0.6 } }
var-202210-0453
Vulnerability from variot
The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38980" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38980" } ] }, "cve": "CVE-2022-38980", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38980", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-148", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38980" }, { "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions", "sources": [ { "db": "NVD", "id": "CVE-2022-38980" }, { "db": "VULHUB", "id": "VHN-434759" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38980", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-148", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "NVD", "id": "CVE-2022-38980" }, { "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "id": "VAR-202210-0453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434759" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:56.584000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211446" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "NVD", "id": "CVE-2022-38980" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38980/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "NVD", "id": "CVE-2022-38980" }, { "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434759" }, { "db": "NVD", "id": "CVE-2022-38980" }, { "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434759" }, { "date": "2022-10-14T16:15:13.467000", "db": "NVD", "id": "CVE-2022-38980" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-20T00:00:00", "db": "VULHUB", "id": "VHN-434759" }, { "date": "2022-10-20T12:43:06.200000", "db": "NVD", "id": "CVE-2022-38980" }, { "date": "2022-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-148" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-148" } ], "trust": 0.6 } }
var-202110-1867
Vulnerability from variot
MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1867", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39972" } ] }, "cve": "CVE-2021-39972", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39972", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401373", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39972", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39972", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2214", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401373", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39972", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017609", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2214", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401373", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39972", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "id": "VAR-202110-1867", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401373" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:22.726000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176762" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39972" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401373" }, { "db": "VULMON", "id": "CVE-2021-39972" }, { "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "db": "NVD", "id": "CVE-2021-39972" }, { "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401373" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39972" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "date": "2022-01-03T22:15:10.237000", "db": "NVD", "id": "CVE-2021-39972" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401373" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39972" }, { "date": "2023-01-27T07:03:00", "db": "JVNDB", "id": "JVNDB-2021-017609" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-39972" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2214" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2214" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding information leakage in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017609" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2214" } ], "trust": 0.6 } }
var-202212-0590
Vulnerability from variot
The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components. Huawei of HarmonyOS and EMUI There is a vulnerability in deserialization of untrusted data.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0590", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41596" } ] }, "cve": "CVE-2022-41596", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41596", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41596", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2485", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components. Huawei of HarmonyOS and EMUI There is a vulnerability in deserialization of untrusted data.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "VULHUB", "id": "VHN-437836" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41596", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023881", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2485", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "id": "VAR-202212-0590", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437836" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:26:54.755000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218945" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41596" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41596/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437836" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "date": "2022-12-20T21:15:10.910000", "db": "NVD", "id": "CVE-2022-41596" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-437836" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "date": "2022-12-24T04:12:38.470000", "db": "NVD", "id": "CVE-2022-41596" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Untrusted Data Deserialization Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ], "trust": 0.6 } }
var-202111-0876
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0876", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37017" } ] }, "cve": "CVE-2021-37017", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37017", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398849", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37017", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37017", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1884", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398849", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37017" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "VULHUB", "id": "VHN-398849" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37017", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015582", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1884", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398849", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "id": "VAR-202111-0876", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398849" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:42.003000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172183" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37017" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398849" }, { "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "db": "NVD", "id": "CVE-2021-37017" }, { "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398849" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "date": "2021-11-23T16:15:09.327000", "db": "NVD", "id": "CVE-2021-37017" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398849" }, { "date": "2022-11-24T08:57:00", "db": "JVNDB", "id": "JVNDB-2021-015582" }, { "date": "2021-11-29T19:00:04.273000", "db": "NVD", "id": "CVE-2021-37017" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1884" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1884" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015582" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1884" } ], "trust": 0.6 } }
var-202112-0252
Vulnerability from variot
There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage. Huawei Smartphones contain an array index validation vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS 2.0 has an information disclosure vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0252", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37062" } ] }, "cve": "CVE-2021-37062", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37062", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398896", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37062", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37062", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2044", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398896", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage. Huawei Smartphones contain an array index validation vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS 2.0 has an information disclosure vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-37062" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "VULHUB", "id": "VHN-398896" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37062", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016039", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2044", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47653", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398896", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "id": "VAR-202112-0252", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398896" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:11.497000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173518" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37062" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398896" }, { "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "db": "NVD", "id": "CVE-2021-37062" }, { "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398896" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "date": "2021-12-07T17:15:08.677000", "db": "NVD", "id": "CVE-2021-37062" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398896" }, { "date": "2022-12-05T07:23:00", "db": "JVNDB", "id": "JVNDB-2021-016039" }, { "date": "2021-12-09T17:39:59.487000", "db": "NVD", "id": "CVE-2021-37062" }, { "date": "2021-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to array index validation in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016039" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2044" } ], "trust": 0.6 } }
var-202212-0588
Vulnerability from variot
The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0588", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46312" } ] }, "cve": "CVE-2022-46312", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46312", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46312", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2495", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "VULHUB", "id": "VHN-444282" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46312", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023885", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2495", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444282", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "id": "VAR-202212-0588", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444282" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:46.644000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218951" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46312" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46312/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444282" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "date": "2022-12-20T21:15:11.257000", "db": "NVD", "id": "CVE-2022-46312" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444282" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "date": "2022-12-24T04:13:56.900000", "db": "NVD", "id": "CVE-2022-46312" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ], "trust": 0.6 } }
var-202111-0948
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0948", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37026" } ] }, "cve": "CVE-2021-37026", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37026", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398859", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37026", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37026", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1892", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398859", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37026" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "VULHUB", "id": "VHN-398859" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37026", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015561", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1892", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398859", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "id": "VAR-202111-0948", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398859" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:17.995000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172190" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37026" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398859" }, { "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "db": "NVD", "id": "CVE-2021-37026" }, { "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398859" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "date": "2021-11-23T16:15:09.627000", "db": "NVD", "id": "CVE-2021-37026" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398859" }, { "date": "2022-11-24T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-015561" }, { "date": "2021-11-29T17:55:52.603000", "db": "NVD", "id": "CVE-2021-37026" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1892" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1892" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015561" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1892" } ], "trust": 0.6 } }
var-202108-0290
Vulnerability from variot
A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service. HarmonyOS Is vulnerable to a lack of free memory after expiration.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0290", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22424" } ] }, "cve": "CVE-2021-22424", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22424", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380859", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22424", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22424", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202108-323", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380859", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22424", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" }, { "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service. HarmonyOS Is vulnerable to a lack of free memory after expiration.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22424", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009363", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-323", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380859", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22424", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" }, { "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "id": "VAR-202108-0290", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380859" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:45.682000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159652" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of free memory after expiration (CWE-401) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22424" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/401.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" }, { "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380859" }, { "db": "VULMON", "id": "CVE-2021-22424" }, { "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "db": "NVD", "id": "CVE-2021-22424" }, { "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380859" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22424" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "date": "2021-08-03T18:15:08.267000", "db": "NVD", "id": "CVE-2021-22424" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380859" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22424" }, { "date": "2022-04-21T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-009363" }, { "date": "2021-08-11T13:14:46.847000", "db": "NVD", "id": "CVE-2021-22424" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-323" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-323" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerabilities in lack of free memory after expiration", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009363" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-323" } ], "trust": 0.6 } }
var-202110-1454
Vulnerability from variot
A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1454", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22465" } ] }, "cve": "CVE-2021-22465", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22465", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380900", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22465", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22465", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2057", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380900", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable. HarmonyOS Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22465" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "VULHUB", "id": "VHN-380900" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22465", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014248", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2057", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380900", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "id": "VAR-202110-1454", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380900" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.331000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171517" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-120", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22465" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380900" }, { "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "db": "NVD", "id": "CVE-2021-22465" }, { "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380900" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "date": "2021-10-28T13:15:09.453000", "db": "NVD", "id": "CVE-2021-22465" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380900" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014248" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22465" }, { "date": "2022-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2057" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2057" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014248" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2057" } ], "trust": 0.6 } }
var-202301-0558
Vulnerability from variot
The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0558", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-47974" } ] }, "cve": "CVE-2022-47974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47974", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-47974", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202301-435", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47974", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001768", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-435", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449902", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47974", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "id": "VAR-202301-0558", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449902" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:38.634000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221312" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47974" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47974/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449902" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47974" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "date": "2023-01-06T20:15:09.830000", "db": "NVD", "id": "CVE-2022-47974" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449902" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47974" }, { "date": "2023-05-09T01:38:00", "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "date": "2023-01-12T16:17:06.877000", "db": "NVD", "id": "CVE-2022-47974" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-435" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-435" } ], "trust": 0.6 } }
var-202302-0456
Vulnerability from variot
The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0456", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48289" } ] }, "cve": "CVE-2022-48289", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48289", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48289", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-346", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48289", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003376", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-346", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453369", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48289", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "id": "VAR-202302-0456", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453369" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:33:59.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225747" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48289 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48289" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48289/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48289" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453369" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48289" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "date": "2023-02-09T17:15:12.850000", "db": "NVD", "id": "CVE-2022-48289" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453369" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48289" }, { "date": "2023-09-07T01:48:00", "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "date": "2023-02-16T14:16:21.480000", "db": "NVD", "id": "CVE-2022-48289" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-346" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-346" } ], "trust": 0.6 } }
var-202212-0612
Vulnerability from variot
Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46319" } ] }, "cve": "CVE-2022-46319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46319", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46319", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2497", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "VULHUB", "id": "VHN-444289" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46319", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024012", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2497", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444289", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "id": "VAR-202212-0612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444289" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:10.060000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218952" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46319" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46319/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444289" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "date": "2022-12-20T21:15:11.597000", "db": "NVD", "id": "CVE-2022-46319" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444289" }, { "date": "2023-12-01T02:32:00", "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "date": "2022-12-24T04:15:59.840000", "db": "NVD", "id": "CVE-2022-46319" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ], "trust": 0.6 } }
var-202210-0123
Vulnerability from variot
The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38998" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38998" } ] }, "cve": "CVE-2022-38998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38998", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-184", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "VULHUB", "id": "VHN-434769" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38998", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-184", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434769", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "id": "VAR-202210-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434769" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.437000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211160" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38998/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434769" }, { "date": "2022-10-14T16:15:16.623000", "db": "NVD", "id": "CVE-2022-38998" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434769" }, { "date": "2022-10-18T15:48:51.240000", "db": "NVD", "id": "CVE-2022-38998" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 } }
var-202210-0124
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0124", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41585" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41585" } ] }, "cve": "CVE-2022-41585", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41585", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-179", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting", "sources": [ { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "VULHUB", "id": "VHN-437818" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41585", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-179", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437818", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "id": "VAR-202210-0124", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437818" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:15.972000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211157" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41585/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437818" }, { "date": "2022-10-14T16:15:23.770000", "db": "NVD", "id": "CVE-2022-41585" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437818" }, { "date": "2022-10-18T17:22:58.810000", "db": "NVD", "id": "CVE-2022-41585" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 } }
var-202210-0177
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0177", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41594" } ] }, "cve": "CVE-2022-41594", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41594", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41594", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-156", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "VULHUB", "id": "VHN-437833" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41594", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-156", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437833", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "id": "VAR-202210-0177", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437833" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:47.211000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210790" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41594" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41594/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437833" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "date": "2022-10-14T16:15:27.057000", "db": "NVD", "id": "CVE-2022-41594" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437833" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "date": "2022-10-15T01:54:40.460000", "db": "NVD", "id": "CVE-2022-41594" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ], "trust": 0.6 } }
var-202210-0414
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0414", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41602" } ] }, "cve": "CVE-2022-41602", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41602", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41602", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-150", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "VULHUB", "id": "VHN-437850" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41602", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018786", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-150", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437850", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "id": "VAR-202210-0414", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437850" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:42.542000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210784" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41602" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41602/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437850" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "date": "2022-10-14T16:15:29.810000", "db": "NVD", "id": "CVE-2022-41602" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437850" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "date": "2022-10-15T01:57:57.243000", "db": "NVD", "id": "CVE-2022-41602" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ], "trust": 0.6 } }
var-202112-0285
Vulnerability from variot
There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37040" } ] }, "cve": "CVE-2021-37040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37040", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37040", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37040", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398873", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08329", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398873", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "id": "VAR-202112-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Parameter\u00a0injection\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173803" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-74", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2021-12-08T15:15:09.267000", "db": "NVD", "id": "CVE-2021-37040" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37040" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 } }
var-202205-0438
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a denial of service vulnerability in the HUAWEI HarmonyOS AI business component. The vulnerability is due to the fact that hiaiserver does not perform strict legality verification on the weights in the model
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0438", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22261" } ] }, "cve": "CVE-2022-22261", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22261", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409790", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22261", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22261", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2545", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409790", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22261", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a denial of service vulnerability in the HUAWEI HarmonyOS AI business component. The vulnerability is due to the fact that hiaiserver does not perform strict legality verification on the weights in the model", "sources": [ { "db": "NVD", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22261", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009671", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2545", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-41787", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409790", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22261", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "id": "VAR-202205-0438", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409790" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T02:00:39.949000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193766" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22261" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22261/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409790" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22261" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "date": "2022-05-13T15:15:08.840000", "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-409790" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-22261" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "date": "2022-05-23T18:43:51.920000", "db": "NVD", "id": "CVE-2022-22261" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2545" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2545" } ], "trust": 0.6 } }
var-202202-0615
Vulnerability from variot
There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0615", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40045" } ] }, "cve": "CVE-2021-40045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40045", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401446", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40045", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40045", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401446", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40045", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40045", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-005383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401446", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40045", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "id": "VAR-202202-0615", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401446" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T22:37:14.969000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182401" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-347", "trust": 1.1 }, { "problemtype": "Improper verification of digital signatures (CWE-347) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/347.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-09T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-09T23:15:16.397000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T04:45:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-16T02:33:08.603000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Digital Signature Verification Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 } }
var-202111-0873
Vulnerability from variot
There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated. Huawei Smartphones have an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0873", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37022" } ] }, "cve": "CVE-2021-37022", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37022", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398855", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37022", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37022", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202111-1889", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398855", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated. Huawei Smartphones have an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37022" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "VULHUB", "id": "VHN-398855" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37022", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015566", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1889", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102859", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398855", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "id": "VAR-202111-0873", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398855" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:01.427000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172187" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37022" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398855" }, { "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "db": "NVD", "id": "CVE-2021-37022" }, { "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398855" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "date": "2021-11-23T16:15:09.457000", "db": "NVD", "id": "CVE-2021-37022" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398855" }, { "date": "2022-11-24T07:11:00", "db": "JVNDB", "id": "JVNDB-2021-015566" }, { "date": "2021-11-29T18:03:37.670000", "db": "NVD", "id": "CVE-2021-37022" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1889" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1889" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Write Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015566" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1889" } ], "trust": 0.6 } }
var-202112-0230
Vulnerability from variot
There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0230", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37088" } ] }, "cve": "CVE-2021-37088", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37088", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398923", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37088", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37088", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2004", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398923", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37088" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "VULHUB", "id": "VHN-398923" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37088", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015942", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2004", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103541", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398923", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "id": "VAR-202112-0230", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398923" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:30.891000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173484" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37088" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398923" }, { "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "db": "NVD", "id": "CVE-2021-37088" }, { "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398923" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "date": "2021-12-07T17:15:09.653000", "db": "NVD", "id": "CVE-2021-37088" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398923" }, { "date": "2022-12-05T01:31:00", "db": "JVNDB", "id": "JVNDB-2021-015942" }, { "date": "2021-12-09T18:02:07.453000", "db": "NVD", "id": "CVE-2021-37088" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2004" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2004" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015942" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2004" } ], "trust": 0.6 } }
var-202111-0846
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0846", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37016" } ] }, "cve": "CVE-2021-37016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 7.8, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 8.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37016", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398848", "impactScore": 7.8, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37016", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37016", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202111-1885", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398848", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message", "sources": [ { "db": "NVD", "id": "CVE-2021-37016" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "VULHUB", "id": "VHN-398848" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37016", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015583", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1885", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102855", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398848", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "id": "VAR-202111-0846", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398848" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:22.098000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172184" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37016" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398848" }, { "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "db": "NVD", "id": "CVE-2021-37016" }, { "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398848" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "date": "2021-11-23T16:15:09.287000", "db": "NVD", "id": "CVE-2021-37016" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398848" }, { "date": "2022-11-24T09:00:00", "db": "JVNDB", "id": "JVNDB-2021-015583" }, { "date": "2021-11-29T15:27:09.597000", "db": "NVD", "id": "CVE-2021-37016" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1885" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1885" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015583" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1885" } ], "trust": 0.6 } }
var-202210-0285
Vulnerability from variot
The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41583" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41583" } ] }, "cve": "CVE-2022-41583", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41583", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-172", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module", "sources": [ { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "VULHUB", "id": "VHN-437814" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41583", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-172", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437814", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "id": "VAR-202210-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437814" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:56.744000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211154" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41583/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437814" }, { "date": "2022-10-14T16:15:22.813000", "db": "NVD", "id": "CVE-2022-41583" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437814" }, { "date": "2022-10-18T17:27:17.167000", "db": "NVD", "id": "CVE-2022-41583" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 } }
var-202202-1399
Vulnerability from variot
There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40015" } ] }, "cve": "CVE-2021-40015", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 1.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40015", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-401416", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.7, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40015", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40015", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401416", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40015", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005385", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401416", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "id": "VAR-202202-1399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:51.678000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182402" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40015" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-02-09T23:15:16.313000", "db": "NVD", "id": "CVE-2021-40015" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T04:58:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-02-16T02:19:28.473000", "db": "NVD", "id": "CVE-2021-40015" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 } }
var-202203-0971
Vulnerability from variot
There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0971", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40051" } ] }, "cve": "CVE-2021-40051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40051", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401452", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40051", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401452", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018713", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401452", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "id": "VAR-202203-0971", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:12.661000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186014" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40051/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2022-03-10T17:43:18.447000", "db": "NVD", "id": "CVE-2021-40051" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40051" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource disclosure to the wrong area in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 } }
var-202108-2288
Vulnerability from variot
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22489" } ] }, "cve": "CVE-2021-22489", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22489", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380924", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22489", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22489", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380924", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22489", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "id": "VAR-202108-2288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.414000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172020" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22489" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22489/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2022-02-25T19:15:11.340000", "db": "NVD", "id": "CVE-2021-22489" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T07:22:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2022-03-08T13:52:39.587000", "db": "NVD", "id": "CVE-2021-22489" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 } }
var-202110-1435
Vulnerability from variot
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1435", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22455" } ] }, "cve": "CVE-2021-22455", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22455", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380890", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22455", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22455", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2045", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380890", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released. HarmonyOS Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22455" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "VULHUB", "id": "VHN-380890" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22455", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014462", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2045", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380890", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "id": "VAR-202110-1435", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380890" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:40.663000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171477" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22455" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380890" }, { "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "db": "NVD", "id": "CVE-2021-22455" }, { "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380890" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "date": "2021-10-28T13:15:09.027000", "db": "NVD", "id": "CVE-2021-22455" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380890" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014462" }, { "date": "2021-11-02T12:35:39.873000", "db": "NVD", "id": "CVE-2021-22455" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2045" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014462" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2045" } ], "trust": 0.6 } }
var-202111-0851
Vulnerability from variot
There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0851", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37009" } ] }, "cve": "CVE-2021-37009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37009", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398840", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37009", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37009", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1879", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398840", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37009" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "VULHUB", "id": "VHN-398840" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37009", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1879", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102858", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398840", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "id": "VAR-202111-0851", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398840" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:40.708000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172178" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37009" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398840" }, { "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "db": "NVD", "id": "CVE-2021-37009" }, { "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398840" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "date": "2021-11-23T16:15:09.067000", "db": "NVD", "id": "CVE-2021-37009" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398840" }, { "date": "2022-11-24T09:15:00", "db": "JVNDB", "id": "JVNDB-2021-015590" }, { "date": "2021-11-29T15:51:02.507000", "db": "NVD", "id": "CVE-2021-37009" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1879" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1879" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1879" } ], "trust": 0.6 } }
var-202112-0250
Vulnerability from variot
There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Applications module of Huawei HarmonyOS 2.0 has a directory traversal vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37064" } ] }, "cve": "CVE-2021-37064", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37064", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398898", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37064", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37064", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2014", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398898", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Applications module of Huawei HarmonyOS 2.0 has a directory traversal vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-37064" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "VULHUB", "id": "VHN-398898" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37064", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2014", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44617", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398898", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "id": "VAR-202112-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398898" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.274000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173493" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37064" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398898" }, { "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "db": "NVD", "id": "CVE-2021-37064" }, { "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398898" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "date": "2021-12-07T17:15:08.760000", "db": "NVD", "id": "CVE-2021-37064" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398898" }, { "date": "2022-12-05T07:15:00", "db": "JVNDB", "id": "JVNDB-2021-016033" }, { "date": "2021-12-09T17:56:15.823000", "db": "NVD", "id": "CVE-2021-37064" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2014" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2014" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016033" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2014" } ], "trust": 0.6 } }
var-202112-0251
Vulnerability from variot
There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37063" } ] }, "cve": "CVE-2021-37063", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37063", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398897", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37063", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37063", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2059", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398897", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37063" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "VULHUB", "id": "VHN-398897" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37063", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016037", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2059", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398897", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "id": "VAR-202112-0251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398897" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:00.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173527" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37063" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398897" }, { "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "db": "NVD", "id": "CVE-2021-37063" }, { "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398897" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "date": "2021-12-07T17:15:08.717000", "db": "NVD", "id": "CVE-2021-37063" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398897" }, { "date": "2022-12-05T07:21:00", "db": "JVNDB", "id": "JVNDB-2021-016037" }, { "date": "2021-12-09T17:39:50.060000", "db": "NVD", "id": "CVE-2021-37063" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2059" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2059" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016037" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2059" } ], "trust": 0.6 } }
var-202210-0400
Vulnerability from variot
The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0400", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "cve": "CVE-2022-41586", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41586", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-163", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "VULHUB", "id": "VHN-437819" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41586", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-163", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437819", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "id": "VAR-202210-0400", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437819" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:29.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211147" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41586/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437819" }, { "date": "2022-10-14T16:15:24.217000", "db": "NVD", "id": "CVE-2022-41586" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437819" }, { "date": "2022-10-18T17:15:43.630000", "db": "NVD", "id": "CVE-2022-41586" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 } }
var-202212-0649
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0649", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46326" } ] }, "cve": "CVE-2022-46326", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46326", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46326", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2513", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "VULHUB", "id": "VHN-444296" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46326", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024017", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2513", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "id": "VAR-202212-0649", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444296" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:08.296000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218959" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46326" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46326/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444296" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "date": "2022-12-20T21:15:11.937000", "db": "NVD", "id": "CVE-2022-46326" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444296" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "date": "2022-12-24T04:17:06.690000", "db": "NVD", "id": "CVE-2022-46326" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ], "trust": 0.6 } }
var-202210-0289
Vulnerability from variot
The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0289", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "cve": "CVE-2022-41588", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41588", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-160", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity", "sources": [ { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "VULHUB", "id": "VHN-437821" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41588", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-160", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437821", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "id": "VAR-202210-0289", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437821" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:25.604000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211146" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41588/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437821" }, { "date": "2022-10-14T16:15:25.250000", "db": "NVD", "id": "CVE-2022-41588" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437821" }, { "date": "2022-10-18T17:11:45.423000", "db": "NVD", "id": "CVE-2022-41588" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 } }
var-202110-1847
Vulnerability from variot
There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1847", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37113" } ] }, "cve": "CVE-2021-37113", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37113", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398949", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37113", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37113", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398949", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37113", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08458", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398949", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37113", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "id": "VAR-202110-1847", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398949" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:41.572000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176782" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37113" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2022-01-03T22:15:09.170000", "db": "NVD", "id": "CVE-2021-37113" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T06:03:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37113" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 } }
var-202210-0320
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0320", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41601" } ] }, "cve": "CVE-2022-41601", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41601", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41601", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-151", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "VULHUB", "id": "VHN-437848" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41601", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018787", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-151", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437848", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "id": "VAR-202210-0320", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437848" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:53.104000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210785" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41601" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41601/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437848" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "date": "2022-10-14T16:15:29.460000", "db": "NVD", "id": "CVE-2022-41601" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437848" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "date": "2022-10-15T01:57:37.013000", "db": "NVD", "id": "CVE-2022-41601" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ], "trust": 0.6 } }
var-202209-0226
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38978" } ] }, "cve": "CVE-2022-38978", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38978", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38978", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38978", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428505", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "id": "VAR-202209-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.896000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208088" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38978" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38978/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-16T18:15:17.350000", "db": "NVD", "id": "CVE-2022-38978" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-17T03:46:58.527000", "db": "NVD", "id": "CVE-2022-38978" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 } }
var-202210-0250
Vulnerability from variot
The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "cve": "CVE-2022-41582", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41582", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-173", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability", "sources": [ { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "VULHUB", "id": "VHN-437812" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41582", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-173", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "id": "VAR-202210-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437812" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:42.425000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211155" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41582/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437812" }, { "date": "2022-10-14T16:15:22.447000", "db": "NVD", "id": "CVE-2022-41582" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437812" }, { "date": "2022-10-18T17:32:15.043000", "db": "NVD", "id": "CVE-2022-41582" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 } }
var-202205-0436
Vulnerability from variot
The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0436", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46786" } ] }, "cve": "CVE-2021-46786", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46786", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-419298", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46786", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46786", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-419298", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel", "sources": [ { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46786", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009694", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47650", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419298", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46786", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "id": "VAR-202205-0436", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419298" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:04.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193775" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46786" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46786/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-13T15:15:08.467000", "db": "NVD", "id": "CVE-2021-46786" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-23T18:48:58.757000", "db": "NVD", "id": "CVE-2021-46786" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 } }
var-202302-0369
Vulnerability from variot
The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48302" } ] }, "cve": "CVE-2022-48302", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48302", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48302", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-338", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48302", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003401", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-338", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453382", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48302", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "id": "VAR-202302-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453382" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:31.231000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225741" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48302" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48302/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453382" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48302" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "date": "2023-02-09T17:15:15.540000", "db": "NVD", "id": "CVE-2022-48302" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453382" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48302" }, { "date": "2023-09-07T03:06:00", "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48302" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-338" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-338" } ], "trust": 0.6 } }
var-202112-0240
Vulnerability from variot
There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0240", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37077" } ] }, "cve": "CVE-2021-37077", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37077", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398911", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37077", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37077", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2042", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398911", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash", "sources": [ { "db": "NVD", "id": "CVE-2021-37077" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "VULHUB", "id": "VHN-398911" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37077", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015953", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2042", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398911", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "id": "VAR-202112-0240", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398911" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.256000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173516" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37077" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398911" }, { "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "db": "NVD", "id": "CVE-2021-37077" }, { "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398911" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "date": "2021-12-07T17:15:09.183000", "db": "NVD", "id": "CVE-2021-37077" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398911" }, { "date": "2022-12-05T02:18:00", "db": "JVNDB", "id": "JVNDB-2021-015953" }, { "date": "2021-12-09T17:36:20.790000", "db": "NVD", "id": "CVE-2021-37077" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2042" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2042" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 in smartphone \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015953" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2042" } ], "trust": 0.6 } }
var-202201-1729
Vulnerability from variot
The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution. Huawei of HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1729", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40036" } ] }, "cve": "CVE-2021-40036", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40036", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401437", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40036", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40036", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-275", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401437", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-40036", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" }, { "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution. Huawei of HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40036", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-019920", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-275", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-66183", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401437", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40036", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" }, { "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "id": "VAR-202201-1729", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401437" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:24.436000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177188" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40036" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40036/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" }, { "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401437" }, { "db": "VULMON", "id": "CVE-2021-40036" }, { "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "db": "NVD", "id": "CVE-2021-40036" }, { "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-401437" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-40036" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "date": "2022-06-13T18:15:09.740000", "db": "NVD", "id": "CVE-2021-40036" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-401437" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2021-40036" }, { "date": "2023-08-25T08:15:00", "db": "JVNDB", "id": "JVNDB-2021-019920" }, { "date": "2022-06-27T16:39:48.947000", "db": "NVD", "id": "CVE-2021-40036" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-275" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-275" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019920" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-275" } ], "trust": 0.6 } }
var-202212-0915
Vulnerability from variot
Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0915", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46328" } ] }, "cve": "CVE-2022-46328", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46328", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46328", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2510", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "VULHUB", "id": "VHN-444298" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46328", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2510", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444298", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "id": "VAR-202212-0915", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444298" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:31.749000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218957" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46328" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46328/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444298" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "date": "2022-12-20T21:15:12.037000", "db": "NVD", "id": "CVE-2022-46328" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444298" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "date": "2022-12-24T04:16:40.063000", "db": "NVD", "id": "CVE-2022-46328" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ], "trust": 0.6 } }
var-202112-0257
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc. Huawei Smartphones contain a vulnerability related to input validation.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0257", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37048" } ] }, "cve": "CVE-2021-37048", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37048", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398881", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37048", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37048", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2022", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398881", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc. Huawei Smartphones contain a vulnerability related to input validation.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37048" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "VULHUB", "id": "VHN-398881" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37048", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015757", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2022", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398881", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "id": "VAR-202112-0257", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398881" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:19.500000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173212" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37048" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398881" }, { "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "db": "NVD", "id": "CVE-2021-37048" }, { "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398881" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "date": "2021-12-07T17:15:08.427000", "db": "NVD", "id": "CVE-2021-37048" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398881" }, { "date": "2022-11-30T01:30:00", "db": "JVNDB", "id": "JVNDB-2021-015757" }, { "date": "2021-12-09T17:41:06.607000", "db": "NVD", "id": "CVE-2021-37048" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015757" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2022" } ], "trust": 0.6 } }
var-202106-1819
Vulnerability from variot
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws. Successful exploitation of this vulnerability could compromise service confidentiality, availability, and integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1819", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22376" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22376" } ] }, "cve": "CVE-2021-22376", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380811", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22376", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.5, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22376", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1986", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380811", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22376", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "NVD", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws. Successful exploitation of this vulnerability could compromise service confidentiality, availability, and integrity", "sources": [ { "db": "NVD", "id": "CVE-2021-22376" }, { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22376", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1986", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380811", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22376", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "NVD", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "id": "VAR-202106-1819", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380811" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:47:04.224000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156069" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "NVD", "id": "CVE-2021-22376" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "NVD", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380811" }, { "db": "VULMON", "id": "CVE-2021-22376" }, { "db": "NVD", "id": "CVE-2021-22376" }, { "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380811" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22376" }, { "date": "2021-06-30T14:15:08.690000", "db": "NVD", "id": "CVE-2021-22376" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "VULHUB", "id": "VHN-380811" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22376" }, { "date": "2021-11-05T17:31:05.297000", "db": "NVD", "id": "CVE-2021-22376" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1986" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1986" } ], "trust": 0.6 } }
var-202108-0285
Vulnerability from variot
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges. HarmonyOS Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22421" } ] }, "cve": "CVE-2021-22421", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22421", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380856", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22421", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22421", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-318", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380856", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22421", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" }, { "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges. HarmonyOS Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22421", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009367", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-318", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380856", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22421", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" }, { "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "id": "VAR-202108-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380856" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:58.256000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Keisei Expectations", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "title": "Huawei HarmonyOS Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159649" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22421" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" }, { "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380856" }, { "db": "VULMON", "id": "CVE-2021-22421" }, { "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "db": "NVD", "id": "CVE-2021-22421" }, { "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380856" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22421" }, { "date": "2022-04-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "date": "2021-08-03T18:15:08.157000", "db": "NVD", "id": "CVE-2021-22421" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-11T00:00:00", "db": "VULHUB", "id": "VHN-380856" }, { "date": "2021-08-11T00:00:00", "db": "VULMON", "id": "CVE-2021-22421" }, { "date": "2022-04-21T08:53:00", "db": "JVNDB", "id": "JVNDB-2021-009367" }, { "date": "2021-08-11T13:32:19.737000", "db": "NVD", "id": "CVE-2021-22421" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-318" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-318" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in privilege management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009367" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-318" } ], "trust": 0.6 } }
var-202203-0881
Vulnerability from variot
There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0881", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40047" } ] }, "cve": "CVE-2021-40047", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40047", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401448", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40047", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40047", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401448", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40047", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018717", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401448", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "id": "VAR-202203-0881", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:31.039000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185903" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40047" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40047/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-10T17:43:16.463000", "db": "NVD", "id": "CVE-2021-40047" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-14T15:35:04.920000", "db": "NVD", "id": "CVE-2021-40047" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 } }
var-202208-0606
Vulnerability from variot
The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0606", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37001" } ] }, "cve": "CVE-2022-37001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37001", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2401", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash. Huawei of HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014555", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2401", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427492", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "id": "VAR-202208-0606", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427492" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:17.912000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204371" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37001" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37001/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427492" }, { "db": "VULMON", "id": "CVE-2022-37001" }, { "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "db": "NVD", "id": "CVE-2022-37001" }, { "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427492" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37001" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "date": "2022-08-10T20:16:03.557000", "db": "NVD", "id": "CVE-2022-37001" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427492" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37001" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014555" }, { "date": "2022-08-15T18:03:58.447000", "db": "NVD", "id": "CVE-2022-37001" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2401" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2401" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014555" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2401" } ], "trust": 0.6 } }
var-202112-0248
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0248", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37066" } ] }, "cve": "CVE-2021-37066", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37066", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398900", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37066", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37066", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2013", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398900", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37066" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "VULHUB", "id": "VHN-398900" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37066", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015977", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2013", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398900", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "id": "VAR-202112-0248", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398900" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173492" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37066" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398900" }, { "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "db": "NVD", "id": "CVE-2021-37066" }, { "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398900" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "date": "2021-12-07T17:15:08.843000", "db": "NVD", "id": "CVE-2021-37066" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398900" }, { "date": "2022-12-05T02:55:00", "db": "JVNDB", "id": "JVNDB-2021-015977" }, { "date": "2021-12-09T17:38:21.527000", "db": "NVD", "id": "CVE-2021-37066" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2013" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2013" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015977" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2013" } ], "trust": 0.6 } }
var-202111-0852
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0852", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37008" } ] }, "cve": "CVE-2021-37008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37008", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398839", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37008", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37008", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1878", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398839", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37008" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "VULHUB", "id": "VHN-398839" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37008", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015639", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1878", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398839", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "id": "VAR-202111-0852", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398839" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:01.450000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172177" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37008" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398839" }, { "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "db": "NVD", "id": "CVE-2021-37008" }, { "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398839" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "date": "2021-11-23T16:15:09.023000", "db": "NVD", "id": "CVE-2021-37008" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398839" }, { "date": "2022-11-28T05:16:00", "db": "JVNDB", "id": "JVNDB-2021-015639" }, { "date": "2021-11-29T15:34:57.450000", "db": "NVD", "id": "CVE-2021-37008" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1878" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1878" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015639" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1878" } ], "trust": 0.6 } }
var-202203-0268
Vulnerability from variot
There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40061" } ] }, "cve": "CVE-2021-40061", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40061", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401462", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40061", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40061", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401462", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40061", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018703", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401462", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "id": "VAR-202203-0268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:02.636000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186006" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40061" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40061/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-10T17:43:23.707000", "db": "NVD", "id": "CVE-2021-40061" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-14T16:18:51.173000", "db": "NVD", "id": "CVE-2021-40061" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 } }
var-202111-0871
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0871", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37024" } ] }, "cve": "CVE-2021-37024", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37024", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398857", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37024", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37024", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1890", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398857", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37024" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "VULHUB", "id": "VHN-398857" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37024", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015564", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1890", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398857", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "id": "VAR-202111-0871", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398857" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:40.616000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172188" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37024" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398857" }, { "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "db": "NVD", "id": "CVE-2021-37024" }, { "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398857" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "date": "2021-11-23T16:15:09.540000", "db": "NVD", "id": "CVE-2021-37024" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398857" }, { "date": "2022-11-24T07:07:00", "db": "JVNDB", "id": "JVNDB-2021-015564" }, { "date": "2021-11-29T18:02:48.780000", "db": "NVD", "id": "CVE-2021-37024" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1890" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1890" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015564" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1890" } ], "trust": 0.6 } }
var-202110-1455
Vulnerability from variot
A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1455", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22464" } ] }, "cve": "CVE-2021-22464", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22464", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380899", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22464", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22464", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202110-2056", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380899", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22464" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "VULHUB", "id": "VHN-380899" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22464", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014247", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2056", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380899", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "id": "VAR-202110-1455", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380899" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.987000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171510" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22464" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380899" }, { "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "db": "NVD", "id": "CVE-2021-22464" }, { "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380899" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "date": "2021-10-28T13:15:09.397000", "db": "NVD", "id": "CVE-2021-22464" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380899" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014247" }, { "date": "2021-11-01T19:24:29.067000", "db": "NVD", "id": "CVE-2021-22464" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2056" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2056" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014247" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2056" } ], "trust": 0.6 } }
var-202212-0651
Vulnerability from variot
The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0651", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46317" } ] }, "cve": "CVE-2022-46317", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46317", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46317", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2502", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "VULHUB", "id": "VHN-444287" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46317", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2502", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "id": "VAR-202212-0651", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444287" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:46.580000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218955" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46317" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46317/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444287" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "date": "2022-12-20T21:15:11.493000", "db": "NVD", "id": "CVE-2022-46317" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444287" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "date": "2022-12-24T04:15:35.443000", "db": "NVD", "id": "CVE-2022-46317" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ], "trust": 0.6 } }
var-202209-0172
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0172", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38994" } ] }, "cve": "CVE-2022-38994", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38994", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38994", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-178", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "VULHUB", "id": "VHN-428514" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38994", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016785", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-178", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428514", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "id": "VAR-202209-0172", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428514" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:53.704000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208083" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38994" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38994/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428514" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "date": "2022-09-16T18:15:17.707000", "db": "NVD", "id": "CVE-2022-38994" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428514" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "date": "2022-09-17T03:11:09.253000", "db": "NVD", "id": "CVE-2022-38994" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ], "trust": 0.6 } }
var-202111-1773
Vulnerability from variot
Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1773", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39984" } ] }, "cve": "CVE-2021-39984", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39984", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401385", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39984", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39984", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2127", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401385", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service. HarmonyOS Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39984", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017582", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2127", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08314", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401385", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39984", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "id": "VAR-202111-1773", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401385" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:11.739000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176788" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39984" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401385" }, { "db": "VULMON", "id": "CVE-2021-39984" }, { "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "db": "NVD", "id": "CVE-2021-39984" }, { "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401385" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39984" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "date": "2022-01-03T22:15:10.793000", "db": "NVD", "id": "CVE-2021-39984" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401385" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39984" }, { "date": "2023-01-27T03:04:00", "db": "JVNDB", "id": "JVNDB-2021-017582" }, { "date": "2022-01-13T17:40:23.130000", "db": "NVD", "id": "CVE-2021-39984" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017582" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2127" } ], "trust": 0.6 } }
var-202201-1027
Vulnerability from variot
The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1027", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40028" } ] }, "cve": "CVE-2021-40028", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40028", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401429", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40028", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40028", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-285", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401429", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" }, { "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity. HarmonyOS Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Successful exploitation of this vulnerability could result in compromised integrity", "sources": [ { "db": "NVD", "id": "CVE-2021-40028" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "VULHUB", "id": "VHN-401429" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40028", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002898", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-285", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401429", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" }, { "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "id": "VAR-202201-1027", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401429" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:59.525000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178000" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40028" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" }, { "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401429" }, { "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "db": "NVD", "id": "CVE-2021-40028" }, { "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401429" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "date": "2022-01-10T14:10:21.867000", "db": "NVD", "id": "CVE-2021-40028" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401429" }, { "date": "2023-01-25T08:24:00", "db": "JVNDB", "id": "JVNDB-2022-002898" }, { "date": "2022-01-13T14:31:05.617000", "db": "NVD", "id": "CVE-2021-40028" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-285" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-285" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002898" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-285" } ], "trust": 0.6 } }
var-202203-0261
Vulnerability from variot
There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40053" } ] }, "cve": "CVE-2021-40053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40053", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401454", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40053", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40053", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401454", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018711", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401454", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "id": "VAR-202203-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:56.714000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208071" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40053/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-03-10T17:43:19.430000", "db": "NVD", "id": "CVE-2021-40053" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-10-27T18:47:20.967000", "db": "NVD", "id": "CVE-2021-40053" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 } }
var-202203-0968
Vulnerability from variot
There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0968", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40049" } ] }, "cve": "CVE-2021-40049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40049", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401450", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40049", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40049", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401450", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018715", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401450", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "id": "VAR-202203-0968", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:01.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Honor Magic Ui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186015" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40049/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-10T17:43:17.500000", "db": "NVD", "id": "CVE-2021-40049" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-14T15:36:29.610000", "db": "NVD", "id": "CVE-2021-40049" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 } }
var-202212-0589
Vulnerability from variot
The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity. Huawei of HarmonyOS Exists in a vulnerability related to the use of freed memory.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0589", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46311" } ] }, "cve": "CVE-2022-46311", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46311", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46311", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2488", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity. Huawei of HarmonyOS Exists in a vulnerability related to the use of freed memory.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46311" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "VULHUB", "id": "VHN-444281" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46311", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023884", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2488", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444281", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "id": "VAR-202212-0589", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444281" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:22.907000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218946" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46311" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46311/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444281" }, { "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "db": "NVD", "id": "CVE-2022-46311" }, { "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444281" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "date": "2022-12-20T21:15:11.203000", "db": "NVD", "id": "CVE-2022-46311" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444281" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023884" }, { "date": "2022-12-24T04:13:37.667000", "db": "NVD", "id": "CVE-2022-46311" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2488" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2488" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023884" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2488" } ], "trust": 0.6 } }
var-202112-0258
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly. Huawei Smartphone products contain an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0258", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37014" } ] }, "cve": "CVE-2021-37014", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37014", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398846", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37014", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37014", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2051", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398846", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly. Huawei Smartphone products contain an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37014" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "VULHUB", "id": "VHN-398846" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37014", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015761", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2051", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398846", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "id": "VAR-202112-0258", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398846" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.350000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173231" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-190", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37014" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398846" }, { "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "db": "NVD", "id": "CVE-2021-37014" }, { "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398846" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "date": "2021-12-07T17:15:08.260000", "db": "NVD", "id": "CVE-2021-37014" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398846" }, { "date": "2022-11-30T01:47:00", "db": "JVNDB", "id": "JVNDB-2021-015761" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37014" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2051" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2051" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015761" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2051" } ], "trust": 0.6 } }
var-202110-1432
Vulnerability from variot
A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1432", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22459" } ] }, "cve": "CVE-2021-22459", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22459", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-380894", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22459", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22459", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2051", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380894", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable", "sources": [ { "db": "NVD", "id": "CVE-2021-22459" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "VULHUB", "id": "VHN-380894" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22459", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014465", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2051", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380894", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "id": "VAR-202110-1432", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380894" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:26.911000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171498" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22459" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380894" }, { "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "db": "NVD", "id": "CVE-2021-22459" }, { "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380894" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "date": "2021-10-28T13:15:09.190000", "db": "NVD", "id": "CVE-2021-22459" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380894" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014465" }, { "date": "2021-11-02T12:58:33.977000", "db": "NVD", "id": "CVE-2021-22459" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2051" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2051" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014465" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2051" } ], "trust": 0.6 } }
var-202111-0872
Vulnerability from variot
There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0872", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37023" } ] }, "cve": "CVE-2021-37023", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37023", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398856", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37023", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37023", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1911", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398856", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37023" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "VULHUB", "id": "VHN-398856" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37023", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015565", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1911", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398856", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "id": "VAR-202111-0872", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398856" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.041000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172199" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37023" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398856" }, { "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "db": "NVD", "id": "CVE-2021-37023" }, { "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398856" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "date": "2021-11-23T16:15:09.500000", "db": "NVD", "id": "CVE-2021-37023" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-398856" }, { "date": "2022-11-24T07:09:00", "db": "JVNDB", "id": "JVNDB-2021-015565" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-37023" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1911" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1911" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015565" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1911" } ], "trust": 0.6 } }
var-202111-0874
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0874", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37019" } ] }, "cve": "CVE-2021-37019", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37019", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398851", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37019", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37019", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1887", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398851", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37019" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "VULHUB", "id": "VHN-398851" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37019", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015579", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1887", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398851", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "id": "VAR-202111-0874", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398851" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:15.394000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172186" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37019" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398851" }, { "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "db": "NVD", "id": "CVE-2021-37019" }, { "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398851" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "date": "2021-11-23T16:15:09.410000", "db": "NVD", "id": "CVE-2021-37019" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398851" }, { "date": "2022-11-24T08:51:00", "db": "JVNDB", "id": "JVNDB-2021-015579" }, { "date": "2021-11-29T18:59:17.893000", "db": "NVD", "id": "CVE-2021-37019" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1887" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1887" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015579" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1887" } ], "trust": 0.6 } }
var-202211-0326
Vulnerability from variot
The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0326", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44562" } ] }, "cve": "CVE-2022-44562", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44562", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44562", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2133", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "VULHUB", "id": "VHN-441952" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44562", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020501", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2133", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441952", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "id": "VAR-202211-0326", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441952" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:41.919000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213973" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44562" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44562/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441952" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "date": "2022-11-09T21:15:18.920000", "db": "NVD", "id": "CVE-2022-44562" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441952" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44562" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ], "trust": 0.6 } }
var-202112-0231
Vulnerability from variot
There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0231", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37087" } ] }, "cve": "CVE-2021-37087", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37087", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398922", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37087", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37087", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2005", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398922", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file. Huawei Smartphones have a path traversal vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37087" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "VULHUB", "id": "VHN-398922" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37087", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015944", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2005", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398922", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "id": "VAR-202112-0231", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398922" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:11.521000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173485" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37087" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398922" }, { "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "db": "NVD", "id": "CVE-2021-37087" }, { "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398922" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "date": "2021-12-07T17:15:09.610000", "db": "NVD", "id": "CVE-2021-37087" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398922" }, { "date": "2022-12-05T01:35:00", "db": "JVNDB", "id": "JVNDB-2021-015944" }, { "date": "2021-12-09T17:34:51.353000", "db": "NVD", "id": "CVE-2021-37087" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2005" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2005" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015944" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2005" } ], "trust": 0.6 } }
var-202210-0401
Vulnerability from variot
The HwAirlink module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause information leakage
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0401", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38981" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38981" } ] }, "cve": "CVE-2022-38981", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38981", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-147", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38981" }, { "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwAirlink module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause information leakage", "sources": [ { "db": "NVD", "id": "CVE-2022-38981" }, { "db": "VULHUB", "id": "VHN-434760" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38981", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-147", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "NVD", "id": "CVE-2022-38981" }, { "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "id": "VAR-202210-0401", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434760" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:01.438000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211144" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "NVD", "id": "CVE-2022-38981" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38981/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "NVD", "id": "CVE-2022-38981" }, { "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434760" }, { "db": "NVD", "id": "CVE-2022-38981" }, { "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434760" }, { "date": "2022-10-14T16:15:13.937000", "db": "NVD", "id": "CVE-2022-38981" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434760" }, { "date": "2022-10-18T12:32:32.240000", "db": "NVD", "id": "CVE-2022-38981" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-147" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-147" } ], "trust": 0.6 } }
var-202203-0973
Vulnerability from variot
There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0973", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40055" } ] }, "cve": "CVE-2021-40055", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40055", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-401456", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40055", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40055", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401456", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40055", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018709", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401456", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "id": "VAR-202203-0973", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:55.882000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185893" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40055" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40055/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-10T17:43:20.810000", "db": "NVD", "id": "CVE-2021-40055" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-14T15:53:08.183000", "db": "NVD", "id": "CVE-2021-40055" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 } }
var-202112-0951
Vulnerability from variot
HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0951", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40003" } ] }, "cve": "CVE-2021-40003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40003", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401404", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-40003", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40003", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-207", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401404", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" }, { "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Exists in a past traversal vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40003" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "VULHUB", "id": "VHN-401404" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40003", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-017521", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-207", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401404", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" }, { "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "id": "VAR-202112-0951", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401404" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:20.528000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172731" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40003" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202112-0000001183296718" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" }, { "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401404" }, { "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "db": "NVD", "id": "CVE-2021-40003" }, { "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401404" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "date": "2022-01-10T14:10:21.093000", "db": "NVD", "id": "CVE-2021-40003" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401404" }, { "date": "2023-01-24T05:54:00", "db": "JVNDB", "id": "JVNDB-2021-017521" }, { "date": "2022-01-13T15:52:49", "db": "NVD", "id": "CVE-2021-40003" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-207" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-207" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017521" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-207" } ], "trust": 0.6 } }
var-202210-0253
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41598" } ] }, "cve": "CVE-2022-41598", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41598", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41598", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-153", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "VULHUB", "id": "VHN-437840" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41598", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018789", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-153", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437840", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "id": "VAR-202210-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437840" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:30.038000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210787" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41598" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41598/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437840" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "date": "2022-10-14T16:15:28.530000", "db": "NVD", "id": "CVE-2022-41598" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437840" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "date": "2022-10-15T01:56:09.340000", "db": "NVD", "id": "CVE-2022-41598" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ], "trust": 0.6 } }
var-202112-0225
Vulnerability from variot
There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that fails to effectively verify integer data
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0225", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37095" } ] }, "cve": "CVE-2021-37095", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37095", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398931", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37095", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37095", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2026", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398931", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution. Huawei Smartphones contain an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a component of the product that fails to effectively verify integer data", "sources": [ { "db": "NVD", "id": "CVE-2021-37095" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "VULHUB", "id": "VHN-398931" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37095", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015940", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2026", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-103536", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398931", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "id": "VAR-202112-0225", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398931" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:58.871000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173503" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37095" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398931" }, { "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "db": "NVD", "id": "CVE-2021-37095" }, { "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398931" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "date": "2021-12-07T17:15:09.857000", "db": "NVD", "id": "CVE-2021-37095" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398931" }, { "date": "2022-12-05T01:21:00", "db": "JVNDB", "id": "JVNDB-2021-015940" }, { "date": "2021-12-09T17:34:29.353000", "db": "NVD", "id": "CVE-2021-37095" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2026" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2026" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015940" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2026" } ], "trust": 0.6 } }
var-202301-0511
Vulnerability from variot
The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0511", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46867" } ] }, "cve": "CVE-2021-46867", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46867", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46867", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-440", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46867", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001772", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-440", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449872", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46867", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "id": "VAR-202301-0511", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449872" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:16:58.155000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221317" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46867" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46867/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449872" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2021-46867" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "date": "2023-01-06T20:15:09.573000", "db": "NVD", "id": "CVE-2021-46867" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449872" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2021-46867" }, { "date": "2023-05-09T02:02:00", "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "date": "2023-01-12T14:14:56.150000", "db": "NVD", "id": "CVE-2021-46867" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-440" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-440" } ], "trust": 0.6 } }
var-202208-0811
Vulnerability from variot
The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0811", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37003" } ] }, "cve": "CVE-2022-37003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37003", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37003", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37003", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014553", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37003", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "id": "VAR-202208-0811", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427496" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:34.474000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204367" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37003" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37003/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-10T20:16:04.073000", "db": "NVD", "id": "CVE-2022-37003" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-15T18:02:06.477000", "db": "NVD", "id": "CVE-2022-37003" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 } }
var-202212-0559
Vulnerability from variot
The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0559", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41591" } ] }, "cve": "CVE-2022-41591", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41591", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41591", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2486", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "VULHUB", "id": "VHN-437827" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41591", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003427", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2486", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437827", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "id": "VAR-202212-0559", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437827" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:22.200000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202212-0000001462975397 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=219371" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41591" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41591/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437827" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "date": "2022-12-20T21:15:10.857000", "db": "NVD", "id": "CVE-2022-41591" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-29T00:00:00", "db": "VULHUB", "id": "VHN-437827" }, { "date": "2023-02-17T01:48:00", "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "date": "2022-12-29T18:52:39.017000", "db": "NVD", "id": "CVE-2022-41591" }, { "date": "2022-12-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2486" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2486" } ], "trust": 0.6 } }
var-202211-0370
Vulnerability from variot
The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0370", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44549" } ] }, "cve": "CVE-2022-44549", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44549", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44549", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2130", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "VULHUB", "id": "VHN-441930" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44549", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020504", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2130", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441930", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "id": "VAR-202211-0370", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441930" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:28.168000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213971" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44549" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44549/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441930" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "date": "2022-11-09T21:15:18.160000", "db": "NVD", "id": "CVE-2022-44549" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441930" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44549" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ], "trust": 0.6 } }
var-202206-0025
Vulnerability from variot
The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0025", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31753" } ] }, "cve": "CVE-2022-31753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31753", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423586", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31753", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31753", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423586", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31753", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31753", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012035", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66173", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423586", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31753", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "id": "VAR-202206-0025", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423586" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:59.362000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for formatting string error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=197630" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.0 }, { "problemtype": "Format string problem (CWE-134) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31753" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31753/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/134.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-06-13T16:15:08.620000", "db": "NVD", "id": "CVE-2022-31753" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-06-27T16:13:45.880000", "db": "NVD", "id": "CVE-2022-31753" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Format String Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "format string error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 } }
var-202208-0666
Vulnerability from variot
The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0666", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37002" } ] }, "cve": "CVE-2022-37002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "id": "VAR-202208-0666", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427494" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:58.071000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204369" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37002" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37002/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2022-08-10T20:16:03.777000", "db": "NVD", "id": "CVE-2022-37002" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-37002" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 } }
var-202205-0481
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0481", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29796" } ] }, "cve": "CVE-2022-29796", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29796", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421305", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29796", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29796", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2548", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421305", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29796", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009625", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2548", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53574", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421305", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29796", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "id": "VAR-202205-0481", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421305" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:58.880000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193769" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29796" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29796/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421305" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29796" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "date": "2022-05-13T15:15:10.080000", "db": "NVD", "id": "CVE-2022-29796" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421305" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29796" }, { "date": "2023-08-07T08:13:00", "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "date": "2022-05-23T18:39:16.137000", "db": "NVD", "id": "CVE-2022-29796" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ], "trust": 0.6 } }
var-202112-0245
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0245", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37070" } ] }, "cve": "CVE-2021-37070", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37070", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398904", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37070", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37070", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2011", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398904", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37070" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "VULHUB", "id": "VHN-398904" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37070", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015979", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2011", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398904", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "id": "VAR-202112-0245", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398904" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:08.129000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173490" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37070" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398904" }, { "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "db": "NVD", "id": "CVE-2021-37070" }, { "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398904" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "date": "2021-12-07T17:15:08.963000", "db": "NVD", "id": "CVE-2021-37070" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398904" }, { "date": "2022-12-05T02:58:00", "db": "JVNDB", "id": "JVNDB-2021-015979" }, { "date": "2021-12-09T17:37:53.523000", "db": "NVD", "id": "CVE-2021-37070" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2011" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2011" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015979" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2011" } ], "trust": 0.6 } }
var-202302-0414
Vulnerability from variot
The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0414", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48294" } ] }, "cve": "CVE-2022-48294", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48294", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48294", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-353", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48294", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003620", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-353", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48294", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "id": "VAR-202302-0414", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453374" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:16:55.673000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225930" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48294" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48294/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453374" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48294" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "date": "2023-02-09T17:15:13.837000", "db": "NVD", "id": "CVE-2022-48294" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453374" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48294" }, { "date": "2023-09-14T07:47:00", "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "date": "2023-02-17T14:17:12.003000", "db": "NVD", "id": "CVE-2022-48294" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-353" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-353" } ], "trust": 0.6 } }
var-202206-0377
Vulnerability from variot
The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0377", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31762" } ] }, "cve": "CVE-2022-31762", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31762", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423595", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31762", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31762", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423595", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31762", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31762", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011277", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66177", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423595", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "id": "VAR-202206-0377", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423595" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:47.147000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196700" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31762 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31762" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31762/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31762" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-06-13T15:15:10.423000", "db": "NVD", "id": "CVE-2022-31762" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-10-05T14:59:08.577000", "db": "NVD", "id": "CVE-2022-31762" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 } }
var-202201-1021
Vulnerability from variot
There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1021", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos wearables", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40009" } ] }, "cve": "CVE-2021-40009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40009", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-08049", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401410", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40009", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40009", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-08049", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401410", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables", "sources": [ { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40009", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002891", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08049", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401410", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "id": "VAR-202201-1021", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" } ] }, "last_update_date": "2023-12-18T14:04:05.148000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/316801" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178011" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40009" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-30T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-10T14:10:21.310000", "db": "NVD", "id": "CVE-2021-40009" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T05:28:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-13T15:32:45.070000", "db": "NVD", "id": "CVE-2021-40009" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 } }
var-202209-0366
Vulnerability from variot
The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0366", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38999" } ] }, "cve": "CVE-2022-38999", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38999", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38999", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-170", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38999", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017155", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-170", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434770", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-38999", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "id": "VAR-202209-0366", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434770" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:55.156000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208080" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38999" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38999/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434770" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-38999" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "date": "2022-09-16T18:15:17.860000", "db": "NVD", "id": "CVE-2022-38999" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-434770" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-38999" }, { "date": "2023-10-11T08:51:00", "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "date": "2022-09-20T18:58:51.147000", "db": "NVD", "id": "CVE-2022-38999" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ], "trust": 0.6 } }
var-202109-1959
Vulnerability from variot
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1959", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22319" } ] }, "cve": "CVE-2021-22319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22319", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380754", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22319", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22319", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380754", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22319", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380754", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "id": "VAR-202109-1959", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:43.444000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202109-0000001150310956 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171906" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22319" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22319/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2022-02-25T19:15:08.823000", "db": "NVD", "id": "CVE-2021-22319" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2022-03-07T17:35:13.593000", "db": "NVD", "id": "CVE-2021-22319" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Integer overflow vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 } }
var-202111-0882
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0882", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37005" } ] }, "cve": "CVE-2021-37005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37005", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398836", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37005", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1874", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398836", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37005" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "VULHUB", "id": "VHN-398836" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37005", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015636", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1874", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "id": "VAR-202111-0882", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398836" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:22.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172173" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37005" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398836" }, { "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "db": "NVD", "id": "CVE-2021-37005" }, { "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398836" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "date": "2021-11-23T16:15:08.893000", "db": "NVD", "id": "CVE-2021-37005" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398836" }, { "date": "2022-11-28T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-015636" }, { "date": "2021-11-29T16:04:50.927000", "db": "NVD", "id": "CVE-2021-37005" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1874" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1874" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015636" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1874" } ], "trust": 0.6 } }
var-202112-0335
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0335", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37020" } ] }, "cve": "CVE-2021-37020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37020", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398853", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37020", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37020", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398853", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37020", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015760", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398853", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "id": "VAR-202112-0335", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.104000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173236" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37020" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2021-12-07T17:15:08.303000", "db": "NVD", "id": "CVE-2021-37020" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T01:43:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37020" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 } }
var-202111-0850
Vulnerability from variot
There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0850", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37010" } ] }, "cve": "CVE-2021-37010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37010", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398842", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37010", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37010", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1881", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398842", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected. Huawei Smartphones are vulnerable to information disclosure.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37010" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "VULHUB", "id": "VHN-398842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37010", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1881", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "id": "VAR-202111-0850", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398842" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:01.472000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172180" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398842" }, { "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "db": "NVD", "id": "CVE-2021-37010" }, { "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398842" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "date": "2021-11-23T16:15:09.113000", "db": "NVD", "id": "CVE-2021-37010" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398842" }, { "date": "2022-11-24T09:13:00", "db": "JVNDB", "id": "JVNDB-2021-015588" }, { "date": "2021-11-29T15:51:38.447000", "db": "NVD", "id": "CVE-2021-37010" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1881" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1881" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Information disclosure vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1881" } ], "trust": 0.6 } }
var-202206-0259
Vulnerability from variot
The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46814" } ] }, "cve": "CVE-2021-46814", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46814", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423547", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46814", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46814", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423547", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46814", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46814", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51604", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423547", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46814", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "id": "VAR-202206-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423547" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:04.965000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46814" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46814/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2022-06-13T15:15:09.893000", "db": "NVD", "id": "CVE-2021-46814" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-46814" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 } }
var-202210-0291
Vulnerability from variot
The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38985" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38985" } ] }, "cve": "CVE-2022-38985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38985", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-146", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "VULHUB", "id": "VHN-434764" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38985", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-146", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434764", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "id": "VAR-202210-0291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434764" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.237000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211143" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38985/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434764" }, { "date": "2022-10-14T16:15:15.777000", "db": "NVD", "id": "CVE-2022-38985" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434764" }, { "date": "2022-10-18T15:38:09.590000", "db": "NVD", "id": "CVE-2022-38985" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 } }
var-202110-1864
Vulnerability from variot
Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability stems from the lack of input validation in a component of HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1864", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37125" } ] }, "cve": "CVE-2021-37125", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37125", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398962", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37125", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37125", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2217", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398962", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected. HarmonyOS There is a vulnerability related to information leakage.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. The vulnerability stems from the lack of input validation in a component of HarmonyOS. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37125", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2217", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08317", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398962", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37125", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "id": "VAR-202110-1864", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398962" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:12.291000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176765" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "information leak (CWE-200) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37125" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398962" }, { "db": "VULMON", "id": "CVE-2021-37125" }, { "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "db": "NVD", "id": "CVE-2021-37125" }, { "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398962" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37125" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "date": "2022-01-03T22:15:09.597000", "db": "NVD", "id": "CVE-2021-37125" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398962" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37125" }, { "date": "2023-01-27T05:17:00", "db": "JVNDB", "id": "JVNDB-2021-017590" }, { "date": "2022-01-13T16:17:25.327000", "db": "NVD", "id": "CVE-2021-37125" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2217" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2217" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding information leakage in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2217" } ], "trust": 0.6 } }
var-202111-1763
Vulnerability from variot
The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak. HarmonyOS Exists in a vulnerability in handling exceptional conditions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS Vision HwNearbyMain. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1763", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37118" } ] }, "cve": "CVE-2021-37118", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37118", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398954", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37118", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37118", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-2137", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398954", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak. HarmonyOS Exists in a vulnerability in handling exceptional conditions.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS Vision HwNearbyMain. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37118", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017300", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2137", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08318", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398954", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37118", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "id": "VAR-202111-1763", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398954" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.994000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176798" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.1 }, { "problemtype": "Improper handling in exceptional conditions (CWE-755) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37118" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202111-0000001172249896" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398954" }, { "db": "VULMON", "id": "CVE-2021-37118" }, { "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "db": "NVD", "id": "CVE-2021-37118" }, { "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398954" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37118" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "date": "2022-01-03T22:15:09.400000", "db": "NVD", "id": "CVE-2021-37118" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398954" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37118" }, { "date": "2023-01-13T06:22:00", "db": "JVNDB", "id": "JVNDB-2021-017300" }, { "date": "2022-01-11T19:52:56", "db": "NVD", "id": "CVE-2021-37118" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2137" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2137" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in handling exceptional conditions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017300" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2137" } ], "trust": 0.6 } }
var-202201-1022
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1022", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40026" } ] }, "cve": "CVE-2021-40026", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40026", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401427", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40026", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40026", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401427", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations", "sources": [ { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40026", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002899", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401427", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "id": "VAR-202201-1022", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:53.181000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178009" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40026" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-10T14:10:21.760000", "db": "NVD", "id": "CVE-2021-40026" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T08:35:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-13T14:26:51.273000", "db": "NVD", "id": "CVE-2021-40026" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 } }
var-202207-0182
Vulnerability from variot
The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0182", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34739" } ] }, "cve": "CVE-2022-34739", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34739", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427091", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34739", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34739", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427091", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34739", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34739", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013201", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52824", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427091", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34739", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "id": "VAR-202207-0182", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427091" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:17.295000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199744" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34739" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34739/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-12T14:15:19.417000", "db": "NVD", "id": "CVE-2022-34739" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-19T12:47:45.723000", "db": "NVD", "id": "CVE-2022-34739" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 } }
var-202112-0237
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission. Huawei Smartphones contain a vulnerability related to input validation.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0237", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37079" } ] }, "cve": "CVE-2021-37079", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37079", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398913", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37079", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37079", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2008", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398913", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission. Huawei Smartphones contain a vulnerability related to input validation.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37079" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "VULHUB", "id": "VHN-398913" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37079", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015951", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2008", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398913", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "id": "VAR-202112-0237", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398913" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.372000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173487" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37079" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398913" }, { "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "db": "NVD", "id": "CVE-2021-37079" }, { "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398913" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "date": "2021-12-07T17:15:09.270000", "db": "NVD", "id": "CVE-2021-37079" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398913" }, { "date": "2022-12-05T02:08:00", "db": "JVNDB", "id": "JVNDB-2021-015951" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37079" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2008" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2008" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015951" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2008" } ], "trust": 0.6 } }
var-202201-1055
Vulnerability from variot
The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1055", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40010" } ] }, "cve": "CVE-2021-40010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40010", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401411", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40010", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40010", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401411", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40010", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002887", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401411", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "id": "VAR-202201-1055", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:25.024000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202201-0000001194056366 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177995" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-01-10T14:10:21.360000", "db": "NVD", "id": "CVE-2021-40010" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T03:05:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-09-30T13:21:19.767000", "db": "NVD", "id": "CVE-2021-40010" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 } }
var-202111-1767
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37133" } ] }, "cve": "CVE-2021-37133", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37133", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398969", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37133", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37133", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37133", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398969", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37133", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "id": "VAR-202111-1767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398969" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.599000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37133" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2022-01-03T22:15:09.800000", "db": "NVD", "id": "CVE-2021-37133" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T05:09:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-37133" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 } }
var-202209-0391
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39005" } ] }, "cve": "CVE-2022-39005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39005", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428499", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "id": "VAR-202209-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428499" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:44.885000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208090" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-16T18:15:18.090000", "db": "NVD", "id": "CVE-2022-39005" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-21T12:47:59.630000", "db": "NVD", "id": "CVE-2022-39005" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 } }
var-202210-0413
Vulnerability from variot
The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0413", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46840" } ] }, "cve": "CVE-2021-46840", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46840", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46840", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-168", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "VULHUB", "id": "VHN-430151" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46840", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-019227", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-168", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430151", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "id": "VAR-202210-0413", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430151" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.149000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211150" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46840" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46840/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-430151" }, { "date": "2023-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "date": "2022-10-14T16:15:12.303000", "db": "NVD", "id": "CVE-2021-46840" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-430151" }, { "date": "2023-10-24T08:20:00", "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "date": "2022-10-18T18:39:27.537000", "db": "NVD", "id": "CVE-2021-46840" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ], "trust": 0.6 } }
var-202112-0236
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a resource management error vulnerability in Huawei HarmonyOS, which is caused by a component of the product not properly releasing resources. Vulnerabilities that can be exploited by an attacker affect availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0236", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37080" } ] }, "cve": "CVE-2021-37080", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37080", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398915", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37080", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37080", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2030", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398915", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. Huawei Smartphones contain an incomplete cleanup vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a resource management error vulnerability in Huawei HarmonyOS, which is caused by a component of the product not properly releasing resources. Vulnerabilities that can be exploited by an attacker affect availability", "sources": [ { "db": "NVD", "id": "CVE-2021-37080" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "VULHUB", "id": "VHN-398915" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37080", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015949", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2030", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01680", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398915", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "id": "VAR-202112-0236", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398915" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:19.523000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173507" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37080" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398915" }, { "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "db": "NVD", "id": "CVE-2021-37080" }, { "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398915" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "date": "2021-12-07T17:15:09.310000", "db": "NVD", "id": "CVE-2021-37080" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398915" }, { "date": "2022-12-05T01:56:00", "db": "JVNDB", "id": "JVNDB-2021-015949" }, { "date": "2021-12-09T17:35:32.100000", "db": "NVD", "id": "CVE-2021-37080" }, { "date": "2021-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2030" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2030" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015949" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2030" } ], "trust": 0.6 } }
var-202201-1727
Vulnerability from variot
The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Has an initialization vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1727", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40025" } ] }, "cve": "CVE-2021-40025", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40025", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401426", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40025", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40025", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-277", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401426", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" }, { "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS Has an initialization vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40025" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "VULHUB", "id": "VHN-401426" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40025", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002900", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-277", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401426", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" }, { "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "id": "VAR-202201-1727", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401426" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:35.511000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177996" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-665", "trust": 1.1 }, { "problemtype": "Improper initialization (CWE-665) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40025" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" }, { "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401426" }, { "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "db": "NVD", "id": "CVE-2021-40025" }, { "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401426" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "date": "2022-01-10T14:10:21.710000", "db": "NVD", "id": "CVE-2021-40025" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401426" }, { "date": "2023-01-25T08:42:00", "db": "JVNDB", "id": "JVNDB-2022-002900" }, { "date": "2022-01-13T03:22:10.053000", "db": "NVD", "id": "CVE-2021-40025" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-277" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Initialization vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002900" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-277" } ], "trust": 0.6 } }
var-202112-0246
Vulnerability from variot
There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0246", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37068" } ] }, "cve": "CVE-2021-37068", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37068", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398902", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37068", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37068", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-469", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398902", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" }, { "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37068" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "VULHUB", "id": "VHN-398902" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37068", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015981", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-469", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398902", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" }, { "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "id": "VAR-202112-0246", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398902" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:58.849000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei Smartphone Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173705" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-400", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37068" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" }, { "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398902" }, { "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "db": "NVD", "id": "CVE-2021-37068" }, { "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398902" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "date": "2021-12-07T17:15:08.923000", "db": "NVD", "id": "CVE-2021-37068" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398902" }, { "date": "2022-12-05T03:06:00", "db": "JVNDB", "id": "JVNDB-2021-015981" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37068" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-469" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-469" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015981" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-469" } ], "trust": 0.6 } }
var-202211-0383
Vulnerability from variot
The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0383", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46852" } ] }, "cve": "CVE-2021-46852", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46852", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46852", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2136", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "VULHUB", "id": "VHN-430160" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46852", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020634", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2136", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430160", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "id": "VAR-202211-0383", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430160" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:21.439000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213974" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46852" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46852/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-430160" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "date": "2022-11-09T21:15:13.230000", "db": "NVD", "id": "CVE-2021-46852" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-430160" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "date": "2022-11-10T19:32:16.360000", "db": "NVD", "id": "CVE-2021-46852" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ], "trust": 0.6 } }
var-202204-0964
Vulnerability from variot
The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40065" } ] }, "cve": "CVE-2021-40065", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40065", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401466", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40065", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40065", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401466", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40065", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40065", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-019278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53579", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401466", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40065", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "id": "VAR-202204-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401466" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:06.468000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189574" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40065" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40065/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-11T20:15:15.987000", "db": "NVD", "id": "CVE-2021-40065" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-15T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-15T19:35:37.037000", "db": "NVD", "id": "CVE-2021-40065" }, { "date": "2022-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 } }
var-202108-0291
Vulnerability from variot
A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-0291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22425" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22425" } ] }, "cve": "CVE-2021-22425", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380860", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-22425", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22425", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-326", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380860", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22425", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "NVD", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges", "sources": [ { "db": "NVD", "id": "CVE-2021-22425" }, { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22425", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-326", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380860", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22425", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "NVD", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "id": "VAR-202108-0291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380860" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:26.305000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159486" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "NVD", "id": "CVE-2021-22425" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22425" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "NVD", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380860" }, { "db": "VULMON", "id": "CVE-2021-22425" }, { "db": "NVD", "id": "CVE-2021-22425" }, { "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "VULHUB", "id": "VHN-380860" }, { "date": "2021-08-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22425" }, { "date": "2021-08-03T18:15:08.310000", "db": "NVD", "id": "CVE-2021-22425" }, { "date": "2021-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380860" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22425" }, { "date": "2021-08-10T21:17:52.270000", "db": "NVD", "id": "CVE-2021-22425" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-326" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-326" } ], "trust": 0.6 } }
var-202205-0387
Vulnerability from variot
The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0387", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22260" } ] }, "cve": "CVE-2022-22260", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22260", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409789", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22260", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22260", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202205-2551", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-409789", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22260", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22260", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009672", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2551", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-409789", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22260", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "id": "VAR-202205-0387", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409789" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:55:47.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193772" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22260" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22260/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409789" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22260" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "date": "2022-05-13T15:15:08.793000", "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-409789" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-22260" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "date": "2022-05-23T18:44:20.450000", "db": "NVD", "id": "CVE-2022-22260" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2551" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009672" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2551" } ], "trust": 0.6 } }
var-202112-0262
Vulnerability from variot
There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service. Huawei A race condition vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37085" } ] }, "cve": "CVE-2021-37085", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37085", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398920", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37085", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37085", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2024", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398920", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service. Huawei A race condition vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-37085" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "VULHUB", "id": "VHN-398920" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37085", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016021", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2024", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-01675", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398920", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "id": "VAR-202112-0262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398920" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:25.002000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173790" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37085" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398920" }, { "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "db": "NVD", "id": "CVE-2021-37085" }, { "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398920" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "date": "2021-12-07T17:15:09.523000", "db": "NVD", "id": "CVE-2021-37085" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398920" }, { "date": "2022-12-05T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-016021" }, { "date": "2021-12-09T15:34:52.777000", "db": "NVD", "id": "CVE-2021-37085" }, { "date": "2021-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2024" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2024" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016021" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2024" } ], "trust": 0.6 } }
var-202302-0315
Vulnerability from variot
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0315", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48299" } ] }, "cve": "CVE-2022-48299", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48299", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48299", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-344", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48299", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003404", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-344", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453379", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48299", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "id": "VAR-202302-0315", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453379" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:41.269000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225745" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48299" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48299/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453379" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48299" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "date": "2023-02-09T17:15:14.853000", "db": "NVD", "id": "CVE-2022-48299" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453379" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48299" }, { "date": "2023-09-07T03:10:00", "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "date": "2023-02-16T19:32:59.147000", "db": "NVD", "id": "CVE-2022-48299" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-344" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-344" } ], "trust": 0.6 } }
var-202110-1863
Vulnerability from variot
Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1863", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37098" } ] }, "cve": "CVE-2021-37098", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37098", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398934", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37098", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37098", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2218", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398934", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash. HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37098", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017382", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2218", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398934", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37098", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "id": "VAR-202110-1863", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398934" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:02.160000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176766" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37098" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398934" }, { "db": "VULMON", "id": "CVE-2021-37098" }, { "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "db": "NVD", "id": "CVE-2021-37098" }, { "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398934" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37098" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "date": "2022-01-03T22:15:08.933000", "db": "NVD", "id": "CVE-2021-37098" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398934" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37098" }, { "date": "2023-01-17T07:13:00", "db": "JVNDB", "id": "JVNDB-2021-017382" }, { "date": "2022-01-11T18:13:47.937000", "db": "NVD", "id": "CVE-2021-37098" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2218" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2218" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017382" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2218" } ], "trust": 0.6 } }
var-202204-1426
Vulnerability from variot
The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1426", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22252" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22252" } ] }, "cve": "CVE-2022-22252", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409781", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22252", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22252", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409781", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22252", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module", "sources": [ { "db": "NVD", "id": "CVE-2022-22252" }, { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22252", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44624", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409781", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22252", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "id": "VAR-202204-1426", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409781" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:54:54.489000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=194227" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22252/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-13T16:15:08.233000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-26T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-26T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-26T15:19:28.540000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 } }
var-202112-0255
Vulnerability from variot
There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user's nickname is maliciously tampered with. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0255", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37058" } ] }, "cve": "CVE-2021-37058", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37058", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398891", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37058", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37058", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2016", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398891", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user\u0027s nickname is maliciously tampered with. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-37058" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "VULHUB", "id": "VHN-398891" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37058", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-016048", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2016", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398891", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "id": "VAR-202112-0255", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398891" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:10.550000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173495" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-732", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37058" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398891" }, { "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "db": "NVD", "id": "CVE-2021-37058" }, { "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398891" }, { "date": "2022-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "date": "2021-12-07T17:15:08.507000", "db": "NVD", "id": "CVE-2021-37058" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398891" }, { "date": "2022-12-05T07:41:00", "db": "JVNDB", "id": "JVNDB-2021-016048" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37058" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2016" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2016" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-016048" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2016" } ], "trust": 0.6 } }
var-202110-1456
Vulnerability from variot
A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1456", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22463" } ] }, "cve": "CVE-2021-22463", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22463", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380898", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22463", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22463", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2055", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380898", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure", "sources": [ { "db": "NVD", "id": "CVE-2021-22463" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "VULHUB", "id": "VHN-380898" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22463", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014246", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2055", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380898", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "id": "VAR-202110-1456", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380898" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:40.640000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202107-0000001123874808", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168202" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22463" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380898" }, { "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "db": "NVD", "id": "CVE-2021-22463" }, { "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380898" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "date": "2021-10-28T13:15:09.357000", "db": "NVD", "id": "CVE-2021-22463" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380898" }, { "date": "2022-10-11T07:46:00", "db": "JVNDB", "id": "JVNDB-2021-014246" }, { "date": "2021-11-01T19:18:32.543000", "db": "NVD", "id": "CVE-2021-22463" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2055" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2055" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014246" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2055" } ], "trust": 0.6 } }
var-202210-0249
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41584" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41584" } ] }, "cve": "CVE-2022-41584", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41584", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-181", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting", "sources": [ { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "VULHUB", "id": "VHN-437815" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41584", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-181", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437815", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "id": "VAR-202210-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437815" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.284000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211158" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41584/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437815" }, { "date": "2022-10-14T16:15:23.267000", "db": "NVD", "id": "CVE-2022-41584" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437815" }, { "date": "2022-10-18T17:23:17.187000", "db": "NVD", "id": "CVE-2022-41584" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 } }
var-202111-1784
Vulnerability from variot
The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to affect user availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1784", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39990" } ] }, "cve": "CVE-2021-39990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39990", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401391", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39990", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39990", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202111-2122", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401391", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-39990", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience. HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to affect user availability", "sources": [ { "db": "NVD", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39990", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017724", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2122", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08453", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401391", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39990", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "id": "VAR-202111-1784", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401391" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:50:26.215000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176783" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401391" }, { "db": "VULMON", "id": "CVE-2021-39990" }, { "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "db": "NVD", "id": "CVE-2021-39990" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401391" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39990" }, { "date": "2023-02-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "date": "2022-01-03T22:15:11.030000", "db": "NVD", "id": "CVE-2021-39990" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401391" }, { "date": "2022-01-14T00:00:00", "db": "VULMON", "id": "CVE-2021-39990" }, { "date": "2023-02-02T02:19:00", "db": "JVNDB", "id": "JVNDB-2021-017724" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2122" }, { "date": "2022-01-14T16:04:15.630000", "db": "NVD", "id": "CVE-2021-39990" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017724" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2122" } ], "trust": 0.6 } }
var-202112-0948
Vulnerability from variot
The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0948", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40004" } ] }, "cve": "CVE-2021-40004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40004", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05174", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401405", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40004", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-05174", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-210", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401405", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" }, { "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality. HarmonyOS There is a vulnerability in improper default permissions.Information may be obtained. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40004" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40004", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017511", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05174", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-210", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401405", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" }, { "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "id": "VAR-202112-0948", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" } ] }, "last_update_date": "2023-12-18T13:42:21.344000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Improper Permission Management Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315081" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172734" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40004" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" }, { "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05174" }, { "db": "VULHUB", "id": "VHN-401405" }, { "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "db": "NVD", "id": "CVE-2021-40004" }, { "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05174" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401405" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "date": "2022-01-10T14:10:21.140000", "db": "NVD", "id": "CVE-2021-40004" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05174" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401405" }, { "date": "2023-01-24T05:12:00", "db": "JVNDB", "id": "JVNDB-2021-017511" }, { "date": "2022-01-13T15:53:05.357000", "db": "NVD", "id": "CVE-2021-40004" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-210" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-210" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017511" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-210" } ], "trust": 0.6 } }
var-202112-0350
Vulnerability from variot
There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0350", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37050" } ] }, "cve": "CVE-2021-37050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37050", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398883", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37050", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37050", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398883", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015858", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398883", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "id": "VAR-202112-0350", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:07.968000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Missing\u00a0sensitive\u00a0data\u00a0encryption\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173788" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-311", "trust": 1.1 }, { "problemtype": "Lack of encryption of critical data (CWE-311) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-12-08T15:15:09.480000", "db": "NVD", "id": "CVE-2021-37050" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-12-09T17:58:47.893000", "db": "NVD", "id": "CVE-2021-37050" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of encryption of important data in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 } }
var-202203-0260
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40052" } ] }, "cve": "CVE-2021-40052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40052", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401453", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40052", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401453", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-40052", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40052", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018712", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401453", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40052", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "id": "VAR-202203-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401453" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:16.265000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=203865" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-40052 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40052/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-40052" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2022-03-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2022-03-10T17:43:18.923000", "db": "NVD", "id": "CVE-2021-40052" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-19T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2023-01-19T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2023-01-19T03:30:20.603000", "db": "NVD", "id": "CVE-2021-40052" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 } }
var-202210-0251
Vulnerability from variot
The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "cve": "CVE-2022-41589", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41589", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-166", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability", "sources": [ { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "VULHUB", "id": "VHN-437822" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41589", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-166", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437822", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "id": "VAR-202210-0251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437822" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:10.320000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211148" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41589/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437822" }, { "date": "2022-10-14T16:15:25.717000", "db": "NVD", "id": "CVE-2022-41589" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437822" }, { "date": "2022-10-18T17:10:49.960000", "db": "NVD", "id": "CVE-2022-41589" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 } }
var-202201-1040
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1040", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40035" } ] }, "cve": "CVE-2021-40035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40035", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401436", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40035", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40035", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401436", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40035", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002908", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-13181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401436", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "id": "VAR-202201-1040", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:35.992000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177446" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40035" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-10T14:10:22.360000", "db": "NVD", "id": "CVE-2021-40035" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-13T15:32:16.207000", "db": "NVD", "id": "CVE-2021-40035" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 } }
var-202207-0144
Vulnerability from variot
The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34743" } ] }, "cve": "CVE-2022-34743", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34743", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427078", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34743", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34743", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427078", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34743", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34743", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013197", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52823", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427078", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34743", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "id": "VAR-202207-0144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427078" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:52.335000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200889" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34743" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34743/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-12T14:15:19.570000", "db": "NVD", "id": "CVE-2022-34743" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-19T12:53:51.187000", "db": "NVD", "id": "CVE-2022-34743" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 } }
var-202111-0853
Vulnerability from variot
There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0853", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37007" } ] }, "cve": "CVE-2021-37007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37007", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398838", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37007", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37007", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1876", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398838", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the fact that the program does not check the message", "sources": [ { "db": "NVD", "id": "CVE-2021-37007" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "VULHUB", "id": "VHN-398838" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37007", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015638", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1876", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102856", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "id": "VAR-202111-0853", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398838" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:15.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172175" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37007" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398838" }, { "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "db": "NVD", "id": "CVE-2021-37007" }, { "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398838" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "date": "2021-11-23T16:15:08.980000", "db": "NVD", "id": "CVE-2021-37007" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398838" }, { "date": "2022-11-28T05:15:00", "db": "JVNDB", "id": "JVNDB-2021-015638" }, { "date": "2021-11-29T15:34:37.520000", "db": "NVD", "id": "CVE-2021-37007" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1876" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1876" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015638" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1876" } ], "trust": 0.6 } }
var-202111-0884
Vulnerability from variot
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0884", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37003" } ] }, "cve": "CVE-2021-37003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37003", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398834", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37003", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37003", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1873", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398834", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37003" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "VULHUB", "id": "VHN-398834" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37003", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015634", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1873", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398834", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "id": "VAR-202111-0884", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398834" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:23.987000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202108-0000001180965965", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172172" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37003" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398834" }, { "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "db": "NVD", "id": "CVE-2021-37003" }, { "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398834" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "date": "2021-11-23T16:15:08.807000", "db": "NVD", "id": "CVE-2021-37003" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-29T00:00:00", "db": "VULHUB", "id": "VHN-398834" }, { "date": "2022-11-28T04:57:00", "db": "JVNDB", "id": "JVNDB-2021-015634" }, { "date": "2021-11-29T16:05:26.050000", "db": "NVD", "id": "CVE-2021-37003" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1873" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1873" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015634" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1873" } ], "trust": 0.6 } }
var-202203-0972
Vulnerability from variot
There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0972", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40050" } ] }, "cve": "CVE-2021-40050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-40050", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-401451", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40050", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40050", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401451", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018714", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401451", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "id": "VAR-202203-0972", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:26.711000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186013" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40050/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-10T17:43:17.980000", "db": "NVD", "id": "CVE-2021-40050" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-14T15:40:09.787000", "db": "NVD", "id": "CVE-2021-40050" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 } }
cve-2021-39988
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39988", "datePublished": "2022-01-03T21:07:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37057
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37057", "datePublished": "2021-12-07T16:02:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40035
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:36", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40035", "datePublished": "2022-01-07T22:39:36", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41583
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module." } ], "problemTypes": [ { "descriptions": [ { "description": "Array out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41583", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40032
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:05:00.909Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40032", "datePublished": "2022-01-07T22:39:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52388
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52388", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:57:39.777962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T19:46:54.793Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the clock module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission control vulnerability in the clock module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:39:24.594Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52388", "datePublished": "2024-04-08T08:39:24.594Z", "dateReserved": "2024-01-26T06:51:31.238Z", "dateUpdated": "2024-08-29T19:46:54.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41294", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:21:00.897014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:23:07.460Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The DP module has a service hijacking vulnerability.Successful exploitation of this vulnerability may affect some Super Device services." } ], "value": "The DP module has a service hijacking vulnerability.Successful exploitation of this vulnerability may affect some Super Device services." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:00:34.076Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41294", "datePublished": "2023-09-25T11:00:34.076Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T15:23:07.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31227
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The hwPartsDFR module has a vulnerability in API calling verification. Successful exploitation of this vulnerability may affect device confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31227", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-02T14:53:31.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48347
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MediaProvider module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48347", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51521
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51521", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:05:24.549536Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:06:11.788Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input parameter verification vulnerability in the background service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Input parameter verification vulnerability in the background service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:12:16.946Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51521", "datePublished": "2024-11-05T09:12:16.946Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T15:06:11.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37125
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37125", "datePublished": "2022-01-03T21:07:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37093
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37093", "datePublished": "2021-12-08T14:13:11", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34162
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Version update determination vulnerability in the user profile module.Successful exploitation of this vulnerability may cause repeated HMS Core updates and cause services to fail." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34162", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48509
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally." } ], "value": "Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:38:03.921Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48509", "datePublished": "2023-07-06T12:38:03.921Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37114
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37114", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37024
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:26:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37024", "datePublished": "2021-11-23T15:26:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22395
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Code injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22395", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48495
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.534Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized access to foreground app information.Successful exploitation of this vulnerability may cause foreground app information to be obtained." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48495", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.534Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41298", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:13:10.275479Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:13:21.160Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:40:32.313Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41298", "datePublished": "2023-09-25T11:40:32.313Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:13:21.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52366
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52366", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T17:52:49.069888Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-22T17:55:49.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:27:57.409Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52366", "datePublished": "2024-02-18T03:27:57.409Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-22T17:55:49.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41307
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41307", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:58:38.157924Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:00:44.351Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:16:21.629Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41307", "datePublished": "2023-09-26T01:16:21.629Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T20:00:44.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51520
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51520", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:06:21.490974Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:06:31.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified in the HDC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified in the HDC module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:10:45.930Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51520", "datePublished": "2024-11-05T09:10:45.930Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T15:06:31.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34159
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "unspecified" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "unspecified" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Notepad app.Successful exploitation of the vulnerability may lead to privilege escalation, which affects availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34159", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51528
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51528", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:39.394302Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:17.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper log printing in the Super Home Screen module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper log printing in the Super Home Screen module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:33:14.126Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51528", "datePublished": "2024-11-05T09:33:14.126Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:17.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41576
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:41.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41576", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:41.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37110
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;Harmony OS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;Harmony OS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "status": "affected", "version": "Harmony OS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Timing design defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37110", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;Harmony OS", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "version_value": "Harmony OS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Timing design defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37110", "datePublished": "2022-01-03T21:07:44", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40017
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40017", "datePublished": "2022-09-16T00:00:00", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40050", "datePublished": "2022-03-07T13:50:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22459
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22459", "datePublished": "2021-10-28T12:31:23", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48287
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48287", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52544
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52544", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T19:27:33.584526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-04T14:37:45.737Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.880Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of file path verification being bypassed in the email module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of file path verification being bypassed in the email module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:52:13.485Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52544", "datePublished": "2024-04-08T08:52:13.485Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-11-04T14:37:45.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.719Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38996", "datePublished": "2022-09-16T17:57:04", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49247
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:32:36.621Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49247", "datePublished": "2023-12-06T08:32:36.621Z", "dateReserved": "2023-11-24T07:33:47.176Z", "dateUpdated": "2024-08-02T21:53:45.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46764
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46764", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:42:56.382210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-15", "description": "CWE-15 External Control of System or Configuration Setting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:50:14.654Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized startup vulnerability of background apps. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "value": "Unauthorized startup vulnerability of background apps. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:10:02.277Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46764", "datePublished": "2023-11-08T10:10:02.277Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T14:50:14.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22468
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22468", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability. Local attackers may exploit this vulnerability to cause kernel address leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22468", "datePublished": "2021-10-28T12:32:49", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34165
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions." } ], "value": "Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Integrity Check Value", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-16T06:54:59.538Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34165", "datePublished": "2023-06-16T06:54:59.538Z", "dateReserved": "2023-05-29T09:03:29.119Z", "dateUpdated": "2024-08-02T16:01:54.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46768
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46768", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:58:05.239312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:58:19.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:51:12.992Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46768", "datePublished": "2023-11-08T02:51:12.992Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T14:58:19.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34160
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34160", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:22:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37008", "datePublished": "2021-11-23T15:22:33", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37069", "datePublished": "2021-12-08T14:12:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40000
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40000", "datePublished": "2022-01-07T22:39:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44107
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44107", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T16:04:02.415029Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T16:04:23.443Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": " Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:06:58.651Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44107", "datePublished": "2023-10-11T12:06:58.651Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T16:04:23.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "status": "affected", "version": "EMUI 12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "version_value": "EMUI 12.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37006", "datePublished": "2022-08-09T20:11:35", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40029
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40029", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39001", "datePublished": "2022-09-16T17:57:48", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52103
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52103", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T17:39:09.904038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:35:16.766Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the FLP module. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "value": "Buffer overflow vulnerability in the FLP module. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:20:52.658Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52103", "datePublished": "2024-01-16T09:20:52.658Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-29T14:35:16.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22326
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Dropping / Lowering Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Dropping / Lowering Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22326", "datePublished": "2021-06-30T13:40:54", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46741", "datePublished": "2022-07-11T13:52:47", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:41.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41581
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41581", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41303
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41303", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:00:18.374761Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:00:59.226Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified." } ], "value": "Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:21:38.790Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41303", "datePublished": "2023-09-25T12:21:38.790Z", "dateReserved": "2023-08-28T12:17:09.165Z", "dateUpdated": "2024-09-24T15:00:59.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52720
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52720", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:52:05.669063Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:04.948Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the soundtrigger module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the soundtrigger module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:06:34.278Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52720", "datePublished": "2024-05-11T10:06:34.278Z", "dateReserved": "2024-04-23T03:42:13.136Z", "dateUpdated": "2024-08-02T23:11:35.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44559
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44559", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42038
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42038", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T15:22:20.484788Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T15:22:32.499Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of PIN enhancement failures in the screen lock module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of PIN enhancement failures in the screen lock module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-310", "description": "CWE-310 Cryptographic Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:31:40.594Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42038", "datePublished": "2024-08-08T09:31:40.594Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-08T15:22:32.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37074
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37074", "datePublished": "2021-12-08T14:12:53", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48606
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48606", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:36:50.235502Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:37:44.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stability-related vulnerability in the binder background management and control module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Stability-related vulnerability in the binder background management and control module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:27:26.749Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48606", "datePublished": "2023-09-26T01:27:26.749Z", "dateReserved": "2023-08-28T12:36:19.571Z", "dateUpdated": "2024-09-24T14:37:44.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48520
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:55:24.026Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48520", "datePublished": "2023-07-06T12:55:24.026Z", "dateReserved": "2023-06-29T11:26:45.309Z", "dateUpdated": "2024-08-03T15:17:54.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52377
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52377", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:30:12.614245Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-27T20:09:51.732Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "value": "Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:07:47.380Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52377", "datePublished": "2024-02-18T06:07:47.380Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38990", "datePublished": "2022-09-16T17:55:50", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44098", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:58:32.844989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T18:59:04.570Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:02:05.173Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44098", "datePublished": "2023-11-08T09:02:05.173Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-04T18:59:04.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27895
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27895", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:08:21.697924Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:47:01.461Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:23:07.774Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27895", "datePublished": "2024-04-08T09:23:07.774Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2024-08-02T00:41:55.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46315
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.\u003c/p\u003e" } ], "value": "The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T03:51:33.193Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46315", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51523
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51523", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:36:03.623394Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:36:13.829Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Information management vulnerability in the Gallery module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Information management vulnerability in the Gallery module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:14:43.954Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51523", "datePublished": "2024-11-05T09:14:43.954Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T15:36:13.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51526
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51526", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:35:41.013633Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:35:52.114Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the hidebug module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the hidebug module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:23:37.762Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51526", "datePublished": "2024-11-05T09:23:37.762Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T15:35:52.114Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46758
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46758", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:31:06.737289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:32:13.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T07:51:25.463Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46758", "datePublished": "2023-11-08T10:18:22.152Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:32:13.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Geofencing API access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44549", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37064
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Limitation of a Pathname to a Restricted Directory vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37064", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Limitation of a Pathname to a Restricted Directory vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37064", "datePublished": "2021-12-07T16:02:55", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39998
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 11.0.1" }, { "status": "affected", "version": "Magic UI 4.0.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Concurrently called for multiple times", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 11.0.1" }, { "version_value": "Magic UI 4.0.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Concurrently called for multiple times" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39998", "datePublished": "2022-01-07T22:39:48", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40025
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40025", "datePublished": "2022-01-07T22:39:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41308
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41308", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:55:49.839413Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T19:57:16.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:17:42.728Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41308", "datePublished": "2023-09-26T01:17:42.728Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T19:57:16.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22489
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22489", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22489", "datePublished": "2022-02-25T18:11:03", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48348
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MediaProvider module has a vulnerability of unauthorized data read. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized data read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48348", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41302
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41302", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:13:33.968642Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:14:54.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:16:12.190Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41302", "datePublished": "2023-09-25T12:16:12.190Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:14:54.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions." } ], "value": "The iaware module has a Use-After-Free (UAF) vulnerability. Successful exploitation of this vulnerability may affect the system functions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:22:31.324Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52115", "datePublished": "2024-01-16T08:22:31.324Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41594
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41594", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48512
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally." } ], "value": "Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:22:38.489Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48512", "datePublished": "2023-07-06T12:22:38.489Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39969
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39969", "datePublished": "2022-01-03T21:07:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48353
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48353", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37118
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak." } ], "problemTypes": [ { "descriptions": [ { "description": " Improper Handling of Exceptional Conditions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Improper Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37118", "datePublished": "2022-01-03T21:07:33", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46316
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Thread security vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46316", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30413
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30413", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T21:08:21.415115Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:39:08.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:03:09.240Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30413", "datePublished": "2024-04-07T08:03:09.240Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-02T01:32:07.291Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1696
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability." } ], "value": "The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:15:55.847Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1696", "datePublished": "2023-05-20T14:15:55.847Z", "dateReserved": "2023-03-29T09:29:54.744Z", "dateUpdated": "2024-08-02T05:57:24.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51525
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51525", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:41:13.120562Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:55.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the clipboard module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the clipboard module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:19:14.465Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51525", "datePublished": "2024-11-05T09:19:14.465Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:55.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39006", "datePublished": "2022-09-16T17:55:56", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44548
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44548", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48313
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T07:07:28.234Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48313", "datePublished": "2023-04-16T07:07:28.234Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2024-08-03T15:10:59.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44554
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44554", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized insertion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized insertion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46742", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37241
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:30:10.304Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37241", "datePublished": "2023-07-06T12:30:10.304Z", "dateReserved": "2023-06-29T10:23:01.714Z", "dateUpdated": "2024-08-02T17:09:34.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39395
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39395", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:05:04.729317Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:46:38.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Mismatch vulnerability in the serialization process in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "value": "Mismatch vulnerability in the serialization process in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-19", "description": "CWE-19 Data Processing Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:31:31.535Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39395", "datePublished": "2023-08-13T12:31:31.535Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:46:38.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39407
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39407", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:24:31.103834Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:24:56.889Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Watchkit has a risk of unauthorized file access.Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "value": "The Watchkit has a risk of unauthorized file access.Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T08:45:47.595Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39407", "datePublished": "2023-09-25T08:45:47.595Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T15:24:56.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:23:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37026", "datePublished": "2021-11-23T15:23:49", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41595
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41595", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34735
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:52:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34735", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34735", "datePublished": "2022-07-11T13:52:53", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22252
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:10:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22252", "datePublished": "2022-05-13T15:10:19", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31751
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Multi-thread contention vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31751", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multi-thread contention vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31751", "datePublished": "2022-06-13T14:55:41", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42032
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42032", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:05:22.021292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:10:34.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Contacts module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Contacts module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:05:15.059Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42032", "datePublished": "2024-08-08T09:05:15.059Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T13:10:34.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22426
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22426", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37078
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37078", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37078", "datePublished": "2021-12-07T16:04:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39402
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39402", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:22.979308Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:34:13.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:38:45.202Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39402", "datePublished": "2023-08-13T12:38:45.202Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:34:13.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45446
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45446", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:12:25.875459Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:12:39.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the camera driver module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Access permission verification vulnerability in the camera driver module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:14:48.613Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45446", "datePublished": "2024-09-04T02:14:48.613Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:12:39.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:53:43.467Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52109", "datePublished": "2024-01-16T07:53:43.467Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22420
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:21:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22420", "datePublished": "2021-08-03T17:21:45", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29790
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Multi-threaded access to the database vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29790", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multi-threaded access to the database vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29790", "datePublished": "2022-05-13T15:04:14", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41596
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41596", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22462
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22462", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22462", "datePublished": "2021-10-28T12:32:17", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37013
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:27:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37013", "datePublished": "2021-11-23T15:27:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38977
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38977", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27896
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27896", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:25:30.298850Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:46:55.377Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the log module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability can affect integrity." } ], "value": "Input verification vulnerability in the log module.\nImpact: Successful exploitation of this vulnerability can affect integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:24:17.171Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27896", "datePublished": "2024-04-08T09:24:17.171Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2024-08-02T00:41:55.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46760
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46760", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:30:22.935359Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:31:27.423Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:30:02.430Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46760", "datePublished": "2023-11-08T09:30:02.430Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:31:27.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39399
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39399", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:26.308780Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:19.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:35:19.017Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39399", "datePublished": "2023-08-13T12:35:19.017Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:19.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41305
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41305", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:07:46.531912Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:08:00.917Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:12:50.286Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41305", "datePublished": "2023-09-26T01:12:50.286Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T18:08:00.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31762
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Input validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31762", "datePublished": "2022-06-13T14:56:38", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40005", "datePublished": "2022-01-07T22:39:30", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22260
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22260", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22260", "datePublished": "2022-05-13T15:03:30", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37059
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Weaknesses Introduced During Design" } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Weaknesses Introduced During Design" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37059", "datePublished": "2021-12-07T16:02:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48491
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of missing authentication on certain HUAWEI phones.Successful exploitation of this vulnerability can lead to ads and other windows to display at any time." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48491", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37084
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37084", "datePublished": "2021-12-07T16:05:02", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44561
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44561", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22434
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22434", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22434", "datePublished": "2022-02-25T18:11:07", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48355
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has a heap out-of-bounds read vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48355", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Vulnerability of accessing resources using an incompatible type (type confusion)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Vulnerability of accessing resources using an incompatible type (type confusion)" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40037", "datePublished": "2022-01-07T22:39:37", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46322
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46322", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39982
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications." } ], "problemTypes": [ { "descriptions": [ { "description": " Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39982", "datePublished": "2022-01-03T21:07:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22453
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22453", "datePublished": "2021-10-28T12:33:19", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37132
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37132", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permissions, Privileges, and Access Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37132", "datePublished": "2022-01-03T21:07:18", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:03.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:43.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The reminder module lacks an authentication mechanism for broadcasts received. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-0116", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2024-08-02T05:02:43.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48479
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition TA of some products has the out-of-bounds memory read vulnerability. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48479", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-03T15:17:54.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52715
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52715", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T13:11:45.425225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:22:28.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The SystemUI module has a vulnerability in permission management.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "The SystemUI module has a vulnerability in permission management.\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:00:08.128Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52715", "datePublished": "2024-04-07T09:00:08.128Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-08-02T23:11:35.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45445
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45445", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:13:22.524221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:13:31.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of resources not being closed or released in the keystore module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of resources not being closed or released in the keystore module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459 Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:54:26.309Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45445", "datePublished": "2024-09-04T01:54:26.309Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:13:31.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52361
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52361", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:37:31.632578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:44.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The VerifiedBoot module has a vulnerability that may cause authentication errors.Successful exploitation of this vulnerability may affect integrity." } ], "value": "The VerifiedBoot module has a vulnerability that may cause authentication errors.Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:59:45.990Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52361", "datePublished": "2024-02-18T02:59:45.990Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-08-02T22:55:41.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31760
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31760", "datePublished": "2022-06-13T15:03:55", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:21:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37007", "datePublished": "2021-11-23T15:21:56", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52358
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52358", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T00:10:44.164340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:39:40.148Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.703Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:57:29.843Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52358", "datePublished": "2024-02-18T02:57:29.843Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-11-14T19:39:40.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27897
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27897", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:53:56.641126Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T13:56:01.303Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the call module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Input verification vulnerability in the call module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:25:40.641Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27897", "datePublished": "2024-04-08T09:25:40.641Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2024-08-02T00:41:55.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Write data to arbitrary address vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Write data to arbitrary address vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40040", "datePublished": "2022-08-09T20:11:21", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51519
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51519", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:41:30.337559Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:11.838Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters not being verified in the HDC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameters not being verified in the HDC module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:09:47.049Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51519", "datePublished": "2024-11-05T09:09:47.049Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:11.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29793
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0, EMUI 10.1.0, EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 3.1.0, Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:51:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0, EMUI 10.1.0, EMUI 10.1.1" }, { "version_value": "Magic UI 3.1.0, Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defect vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29793", "datePublished": "2022-05-13T15:05:15", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52379
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52379", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:30:07.873785Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T17:03:08.705Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:10:40.306Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52379", "datePublished": "2024-02-18T06:10:40.306Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48291
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an authentication bypass vulnerability in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48291", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9136
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9136", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:08:07.478210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:09:37.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the App Multiplier module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the App Multiplier module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:24:09.033Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-9136", "datePublished": "2024-09-27T10:24:09.033Z", "dateReserved": "2024-09-24T06:27:15.239Z", "dateUpdated": "2024-09-27T15:09:37.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51518
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-51518", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T17:14:51.854825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T17:15:46.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of message types not being verified in the advanced messaging modul\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of message types not being verified in the advanced messaging modul\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:08:46.445Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51518", "datePublished": "2024-11-05T09:08:46.445Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T17:15:46.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52721
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52721", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-28T20:15:52.408244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:02.872Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The WindowManager module has a vulnerability in permission control.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The WindowManager module has a vulnerability in permission control.\nImpact: Successful exploitation of this vulnerability may affect confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:16:08.629Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52721", "datePublished": "2024-05-11T10:16:08.629Z", "dateReserved": "2024-04-23T03:42:13.137Z", "dateUpdated": "2024-08-02T23:11:35.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37048
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37048", "datePublished": "2021-12-07T16:02:11", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39388
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39388", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:48:04.906896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1285", "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:49:34.727Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:28:21.408Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39388", "datePublished": "2023-08-13T11:28:21.408Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:49:34.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37003", "datePublished": "2022-08-09T20:10:59", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46811
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission management vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46811", "datePublished": "2022-06-13T15:06:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40038
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double free" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40038", "datePublished": "2022-01-07T22:39:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40024
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information leakage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information leakage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40024", "datePublished": "2022-09-16T17:55:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30417
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30417", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:45:44.679051Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:38:28.172Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the Bluetooth-based sharing module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Path traversal vulnerability in the Bluetooth-based sharing module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:16:15.889Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30417", "datePublished": "2024-04-07T08:16:15.889Z", "dateReserved": "2024-03-27T03:38:10.315Z", "dateUpdated": "2024-08-02T01:32:07.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46326
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46326", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51516
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51516", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:12.314984Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:27.035Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the ability module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause features to function abnormally." } ], "value": "Permission control vulnerability in the ability module\nImpact: Successful exploitation of this vulnerability may cause features to function abnormally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:03:15.961Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51516", "datePublished": "2024-11-05T09:03:15.961Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:27.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37002", "datePublished": "2022-08-09T20:10:52", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48605
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-48605", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:01:52.779080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:07:53.562Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "value": "Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:20:03.237Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48605", "datePublished": "2023-09-25T12:20:03.237Z", "dateReserved": "2023-08-28T12:36:11.353Z", "dateUpdated": "2024-09-24T15:07:53.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37007", "datePublished": "2022-08-09T20:10:24", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39983
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39983", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39983", "datePublished": "2022-01-03T21:07:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38981
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwAirlink module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38981", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46771
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46771", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:56:55.647199Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:01:40.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Security vulnerability in the face unlock module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Security vulnerability in the face unlock module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:03:34.784Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46771", "datePublished": "2023-11-08T09:03:34.784Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:01:40.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52374
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52374", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T00:09:06.824259Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:21.893Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T04:04:47.756Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52374", "datePublished": "2024-02-18T04:04:47.756Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39401
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39401", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:24.099297Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:34:41.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:37:40.608Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39401", "datePublished": "2023-08-13T12:37:40.608Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:34:41.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22461
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Allocation of Resources Without Limits or Throttling vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22461", "datePublished": "2021-10-28T12:33:25", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30415
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30415", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T17:41:34.805641Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T17:46:02.363Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:06:02.275Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30415", "datePublished": "2024-04-07T08:06:02.275Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-11-05T17:46:02.363Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1693
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:12:33.342Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1693", "datePublished": "2023-05-20T14:12:33.342Z", "dateReserved": "2023-03-29T09:29:51.236Z", "dateUpdated": "2024-08-02T05:57:24.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22257
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22257", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22257", "datePublished": "2022-04-11T19:38:18", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46765
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46765", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:19:55.559656Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:53:53.424Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:14:18.869Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46765", "datePublished": "2023-11-08T09:14:18.869Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-10-28T20:53:53.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37073
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37073", "datePublished": "2021-12-07T16:04:02", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30414
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30414", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T20:24:29.578357Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T20:28:41.866Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Command injection vulnerability in the AccountManager module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Command injection vulnerability in the AccountManager module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:04:37.661Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30414", "datePublished": "2024-04-07T08:04:37.661Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-20T20:28:41.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39002
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39002", "datePublished": "2022-09-16T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37087
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37087", "datePublished": "2021-12-07T16:05:44", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39386
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39386", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:05:09.310273Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:06:08.131Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause newly installed apps to fail to restart." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause newly installed apps to fail to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:20:45.686Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39386", "datePublished": "2023-08-13T12:20:45.686Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:06:08.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48496
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48496", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:55.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32992
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32992", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:11.792635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:09.934Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification vulnerability in the baseband module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Insufficient verification vulnerability in the baseband module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:49:03.841Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32992", "datePublished": "2024-05-11T09:49:03.841Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37022
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:26:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37022", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37022", "datePublished": "2021-11-23T15:26:49", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48356
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in input parameter verification. Successful exploitation of this vulnerability may cause failed facial recognition." } ], "problemTypes": [ { "descriptions": [ { "description": "Input parameter verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48356", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52384
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52384", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:53:22.048730Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:56.141Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.781Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Double-free vulnerability in the RSMC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Double-free vulnerability in the RSMC module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:53:58.821Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52384", "datePublished": "2024-05-11T09:53:58.821Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39971
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39971", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39971", "datePublished": "2022-01-03T21:07:21", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40053", "datePublished": "2022-03-07T13:50:29", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39380
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39380", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:22:05.018130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:24:16.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:39:45.292Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39380", "datePublished": "2023-08-13T11:39:45.292Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:24:16.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46320
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46320", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49246
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:01:24.648Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49246", "datePublished": "2023-12-06T09:01:24.648Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:23:14.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52104", "datePublished": "2024-01-16T09:23:14.259Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41300
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41300", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:56:17.985225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:56:29.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:03:58.711Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41300", "datePublished": "2023-09-25T12:03:58.711Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:56:29.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-7265
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7265", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:01:58.335486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:02:07.503Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the lock screen module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability" } ], "value": "Permission verification vulnerability in the lock screen module\nImpact: Successful exploitation of this vulnerability may affect availability" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T08:06:06.977Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-7265", "datePublished": "2024-08-08T08:06:06.977Z", "dateReserved": "2024-05-29T07:55:13.655Z", "dateUpdated": "2024-08-08T14:02:07.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22450
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22450", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22450", "datePublished": "2021-10-28T12:31:41", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46324
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46324", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability." } ], "value": "The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:54:39.422Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52110", "datePublished": "2024-01-16T07:54:39.422Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48294", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52381
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52381", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T20:43:29.275736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T20:43:36.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:13:23.818Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52381", "datePublished": "2024-02-18T06:13:23.818Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-05T20:43:36.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22423
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:21:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22423", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22423", "datePublished": "2021-08-03T17:21:56", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44115", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:59:20.274116Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T18:59:37.028Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the Booster module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper permission control in the Booster module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T03:59:40.013Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44115", "datePublished": "2023-11-08T03:59:40.013Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-04T18:59:37.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34166
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34166", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42036
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42036", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:02:31.386988Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:02:40.553Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Notepad module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Notepad module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:28:19.295Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42036", "datePublished": "2024-08-08T09:28:19.295Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-08T14:02:40.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37014
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:01:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37014", "datePublished": "2021-12-07T16:01:50", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect pointer usage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect pointer usage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40012", "datePublished": "2022-07-11T13:53:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4046
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4046", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:46:21.735350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T18:37:53.636Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:26:57.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cracking vulnerability in the OS security module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Cracking vulnerability in the OS security module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:14:22.270Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-4046", "datePublished": "2024-05-11T10:14:22.270Z", "dateReserved": "2024-04-23T03:46:12.366Z", "dateUpdated": "2024-08-01T20:26:57.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22421
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:18:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22421", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22421", "datePublished": "2021-08-03T17:18:19", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52385
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52385", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:39:29.529714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:34:51.936Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:18:43.493Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52385", "datePublished": "2024-04-08T09:18:43.493Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-14T19:34:51.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41296", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:21:43.121477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:21:50.631Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality." } ], "value": "Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:37:37.692Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41296", "datePublished": "2023-09-25T11:37:37.692Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:21:50.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48290
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The phone-PC collaboration module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48290", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49244
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:58:41.728Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49244", "datePublished": "2023-12-06T08:58:41.728Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:45.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46313
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone\u0027s camera and microphone." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46313", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40028
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40028", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40028", "datePublished": "2022-01-07T22:39:46", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52376
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52376", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T13:29:44.977828Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:13:20.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:06:24.995Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52376", "datePublished": "2024-02-18T06:06:24.995Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-10-28T20:13:20.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22460
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Verification of Data Authenticity", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22460", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to bypass the control mechanism." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22460", "datePublished": "2021-10-28T12:31:29", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52382
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-04-17T06:18:32.562Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "rejectedReasons": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52382", "datePublished": "2024-04-07T08:45:15.270Z", "dateRejected": "2024-04-17T06:18:20.017Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-04-17T06:18:32.562Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.0" }
cve-2022-29791
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29791", "datePublished": "2022-05-13T15:04:30", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34737
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34737", "datePublished": "2022-07-11T13:53:35", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39404
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39404", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:22:45.741109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:22:57.466Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:41:04.975Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39404", "datePublished": "2023-08-13T12:41:04.975Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T16:22:57.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52538
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52538", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T18:15:40.744850Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-12T15:47:19.803Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the HwIms module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of package name verification being bypassed in the HwIms module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:43:01.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52538", "datePublished": "2024-04-08T08:43:01.514Z", "dateReserved": "2024-02-27T03:41:51.380Z", "dateUpdated": "2024-08-02T23:03:20.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39987
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39987", "datePublished": "2022-01-03T21:07:37", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37083
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.855Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37083", "datePublished": "2021-12-07T16:04:54", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39385
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39385", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:07:47.374173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:08:18.847Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of configuration defects in the media module of certain products.. Successful exploitation of this vulnerability may cause unauthorized access." } ], "value": "Vulnerability of configuration defects in the media module of certain products.. Successful exploitation of this vulnerability may cause unauthorized access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:19:40.462Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39385", "datePublished": "2023-08-13T12:19:40.462Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:08:18.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3455
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:19:46.945Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-3455", "datePublished": "2023-07-05T12:19:46.945Z", "dateReserved": "2023-06-29T10:23:01.404Z", "dateUpdated": "2024-08-02T06:55:03.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:08:40.262680Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:08:57.208Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:57:43.178Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44110", "datePublished": "2023-10-11T11:57:43.178Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:08:57.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40048
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40048", "datePublished": "2022-03-07T13:51:00", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52372
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "04.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52372", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:08:27.734292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:20:10.143Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:51:16.108Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52372", "datePublished": "2024-02-18T03:51:16.108Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-29T15:20:10.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52383
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52383", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:53:54.558902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:38.176Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Double-free vulnerability in the RSMC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Double-free vulnerability in the RSMC module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:52:36.457Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52383", "datePublished": "2024-05-11T09:52:36.457Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44556
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 12.0.0" } ] }, { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "HarmonyOS 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMissing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability.\u003c/p\u003e" } ], "value": "Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Type Conversion or Cast", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T12:59:51.447Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44556", "datePublished": "2022-11-08T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30416
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30416", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T18:27:06.445639Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T18:27:35.333Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the underlying driver module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Use After Free (UAF) vulnerability in the underlying driver module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:07:34.891Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30416", "datePublished": "2024-04-07T08:07:34.891Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-02T01:32:07.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30418
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30418", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T15:01:21.403003Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-22T15:04:09.375Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insufficient permission verification in the app management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of insufficient permission verification in the app management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:19:56.977Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30418", "datePublished": "2024-04-07T08:19:56.977Z", "dateReserved": "2024-03-27T03:38:10.315Z", "dateUpdated": "2024-08-22T15:04:09.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48516
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality." } ], "value": "Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:47:17.275Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48516", "datePublished": "2023-07-06T12:47:17.275Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48361
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Always On Display (AOD) has a path traversal vulnerability in theme files. Successful exploitation of this vulnerability may cause a failure in reading AOD theme resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48361", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22469
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause kernel out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22469", "datePublished": "2021-10-28T12:32:55", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39392
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39392", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:30:49.934527Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:31:21.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten." } ], "value": "Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:33:13.167Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39392", "datePublished": "2023-08-13T11:33:13.167Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T14:31:21.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31753
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31753", "datePublished": "2022-06-13T15:06:07", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52540
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52540", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:03:42.318285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:12.782Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper authentication in the Iaware module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper authentication in the Iaware module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:46:23.790Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52540", "datePublished": "2024-04-08T08:46:23.790Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-02T23:03:20.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40061
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Type confusion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40061", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Type confusion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40061", "datePublished": "2022-03-07T13:49:40", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41597
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41597", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:27:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37010", "datePublished": "2021-11-23T15:27:09", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51512
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51512", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:40.596534Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:58.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameter type not being verified in the WantAgent module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of parameter type not being verified in the WantAgent module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:39:59.207Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51512", "datePublished": "2024-11-05T08:39:59.207Z", "dateReserved": "2024-10-29T01:43:54.523Z", "dateUpdated": "2024-11-05T14:53:58.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46769
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46769", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:56:12.483627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:57:04.410Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use-After-Free (UAF) vulnerability in the dubai module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Use-After-Free (UAF) vulnerability in the dubai module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:52:20.476Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46769", "datePublished": "2023-11-08T02:52:20.476Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T14:57:04.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing sensitive data encryption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing sensitive data encryption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37050", "datePublished": "2021-12-08T14:12:20", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52378
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52378", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T19:00:23.207930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:15.362Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:09:05.754Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52378", "datePublished": "2024-02-18T06:09:05.754Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52553
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52553", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T18:20:08.622982Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T16:04:10.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the Wi-Fi module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the Wi-Fi module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:00:03.869Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52553", "datePublished": "2024-04-08T09:00:03.869Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-11-05T16:04:10.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37061
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37061", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37061", "datePublished": "2021-12-07T16:02:37", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:23:26.566Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52106", "datePublished": "2024-01-16T09:26:20.061Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-09-04T01:23:26.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "value": "launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:58:43.439Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52113", "datePublished": "2024-01-16T07:58:43.439Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37072
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37072", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37072", "datePublished": "2021-12-07T16:03:57", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48518
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance." } ], "value": "Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:53:19.166Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48518", "datePublished": "2023-07-06T12:53:19.166Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-08-03T15:17:54.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40015
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40015", "datePublished": "2022-02-09T22:03:57", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48286
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48286", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37001
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The diag-router module has a vulnerability in intercepting excessive long and short instructions. Successful exploitation of this vulnerability will cause the diag-router module to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Copy without Checking Size of Input" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37001", "datePublished": "2022-08-09T20:10:41", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46852
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.716Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46852", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-04T05:17:42.716Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37054
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Identity spoofing and authentication bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Identity spoofing and authentication bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37054", "datePublished": "2021-12-08T14:12:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48314
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Bluetooth vulnerability confidentiality", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T07:11:54.749Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48314", "datePublished": "2023-04-16T07:11:54.749Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2024-08-03T15:10:59.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22424
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:17:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22424", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Release of Resource after Effective Lifetime" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22424", "datePublished": "2021-08-03T17:17:48", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22376
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22376", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22376", "datePublished": "2021-06-30T13:57:51", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44555
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Service hijacking vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44555", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41312", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:42:24.301075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:42:32.332Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:23:42.389Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41312", "datePublished": "2023-09-26T01:23:42.389Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-24T17:42:32.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52714
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52714", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:33:25.143460Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-657", "description": "CWE-657 Violation of Secure Design Principles", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:38:40.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the hwnff module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of defects introduced in the design process in the hwnff module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:43:50.830Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52714", "datePublished": "2024-04-07T08:43:50.830Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-08-14T18:38:40.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38995
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38995", "datePublished": "2022-09-16T17:57:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44096
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44096", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:35:45.799069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:36:12.855Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:39:45.891Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44096", "datePublished": "2023-10-11T10:37:38.290Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:36:12.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29795
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29795", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29795", "datePublished": "2022-05-13T15:05:43", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1691
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:50:39.273Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1691", "datePublished": "2023-07-06T12:50:39.273Z", "dateReserved": "2023-03-29T09:29:47.827Z", "dateUpdated": "2024-08-02T05:57:24.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38991
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38991", "datePublished": "2022-09-16T17:56:49", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44095
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44095", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:31:08.203080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:31:50.182Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash." } ], "value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:44:10.955Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44095", "datePublished": "2023-10-11T11:44:10.955Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:31:50.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39968
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39968", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Business Logic Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39968", "datePublished": "2022-01-03T21:07:19", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47975
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47975", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-03T15:02:36.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51524
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51524", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:41:21.529225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:03.632Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Wi-Fi module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Wi-Fi module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:15:43.707Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51524", "datePublished": "2024-11-05T09:15:43.707Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:53:03.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48511
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the audio PCM driver module under special conditions. Successful exploitation of this vulnerability may cause audio features to perform abnormally." } ], "value": "Use After Free (UAF) vulnerability in the audio PCM driver module under special conditions. Successful exploitation of this vulnerability may cause audio features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:39:53.975Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48511", "datePublished": "2023-07-06T12:39:53.975Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39977
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39977", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39977", "datePublished": "2022-01-03T21:07:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31758
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31758", "datePublished": "2022-06-13T14:55:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37098
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.855Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37098", "datePublished": "2022-01-03T21:07:14", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:43.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The online authentication provided by the hwKitAssistant lacks strict identity verification of applications. Successful exploitation of this vulnerability may affect availability of features,such as MeeTime." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-0117", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2024-08-02T05:02:43.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32998
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32998", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:47:47.527475Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:47.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "NULL pointer access vulnerability in the clock module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "NULL pointer access vulnerability in the clock module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "CWE-824 Access of Uninitialized Pointer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:08:09.604Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32998", "datePublished": "2024-05-11T10:08:09.604Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:49:56.189Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44117", "datePublished": "2024-01-16T07:49:56.189Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-08-02T19:59:50.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40036
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory overwrite vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T18:01:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory overwrite vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40036", "datePublished": "2022-06-13T18:01:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:06:53.827509Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:07:09.553Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory request vulnerability in the memory management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Memory request vulnerability in the memory management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:22:15.826Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-8298", "datePublished": "2024-09-04T02:22:15.826Z", "dateReserved": "2024-08-29T06:20:19.754Z", "dateUpdated": "2024-09-04T13:07:09.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a vulnerability of repeated app restart due to improper parameters. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper parameters vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26549", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-02T11:53:53.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32990
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32990", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:58.531221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:27.380Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system sharing pop-up module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:39:48.843Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32990", "datePublished": "2024-05-11T09:44:25.800Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39010", "datePublished": "2022-09-16T17:57:54", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44094
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44094", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:32:58.483149Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:33:23.135Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:43:24.196Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44094", "datePublished": "2023-10-11T10:43:24.196Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:33:23.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52550
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52550", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:25:50.849949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T19:34:53.596Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:56:22.568Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52550", "datePublished": "2024-04-08T08:56:22.568Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-20T19:34:53.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22432
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22432", "datePublished": "2022-02-25T18:11:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37020
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:01:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37020", "datePublished": "2021-12-07T16:01:55", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34739
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ], "problemTypes": [ { "descriptions": [ { "description": "Addition overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34739", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Addition overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34739", "datePublished": "2022-07-11T13:53:23", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44097", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:29:38.951364Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:30:16.188Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:46:30.245Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44097", "datePublished": "2023-10-11T11:46:30.245Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:30:16.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40030
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40030", "datePublished": "2022-08-09T20:11:10", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46814
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory read/write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:54:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds memory read/write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46814", "datePublished": "2022-06-13T14:54:56", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39383
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39383", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:15:11.224532Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:16:00.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the AMS module. Successful exploitation of this vulnerability may compromise apps\u0027 data security." } ], "value": "Vulnerability of input parameters being not strictly verified in the AMS module. Successful exploitation of this vulnerability may compromise apps\u0027 data security." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:43:27.816Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39383", "datePublished": "2023-08-13T11:43:27.816Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:16:00.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39382
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39382", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:17:30.687282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:19:02.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Input verification vulnerability in the audio module. Successful exploitation of this vulnerability may cause virtual machines (VMs) to restart." } ], "value": " Input verification vulnerability in the audio module. Successful exploitation of this vulnerability may cause virtual machines (VMs) to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:42:16.914Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39382", "datePublished": "2023-08-13T11:42:16.914Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:19:02.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37242
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities." } ], "value": "Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:31:20.338Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37242", "datePublished": "2023-07-06T12:31:20.338Z", "dateReserved": "2023-06-29T10:23:01.714Z", "dateUpdated": "2024-08-02T17:09:33.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46885
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46885", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39967
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper broadcast permission settings", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper broadcast permission settings" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39967", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37117
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37117", "datePublished": "2022-01-03T21:07:29", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52362
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52362", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:01:25.382152Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:16:12.047Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:00:55.155Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52362", "datePublished": "2024-02-18T03:00:55.155Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-10-28T20:16:12.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45448
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45448", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:09:15.541476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:09:23.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "5.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Page table protection configuration vulnerability in the trusted firmware module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Page table protection configuration vulnerability in the trusted firmware module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:17:25.555Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45448", "datePublished": "2024-09-04T02:19:20.881Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-11-05T09:17:25.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission verification bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39007", "datePublished": "2022-09-16T17:57:45", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22457
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22457", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22457", "datePublished": "2021-10-28T12:31:16", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48302
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.732Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48302", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46884
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46884", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39406
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39406", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:22:14.506505Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:22:22.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the XLayout component. Successful exploitation of this vulnerability may cause apps to forcibly restart." } ], "value": "Permission control vulnerability in the XLayout component. Successful exploitation of this vulnerability may cause apps to forcibly restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:42:27.139Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39406", "datePublished": "2023-08-13T12:42:27.139Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-10-09T16:22:22.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42033
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42033", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:11:41.251489Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:11:53.494Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003empact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nmpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:21:20.866Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42033", "datePublished": "2024-08-08T09:21:20.866Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T14:11:53.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46755
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46755", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T20:31:15.646377Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-03T20:34:53.624Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the input. Successful exploitation of this vulnerability may cause the launcher to restart." } ], "value": "Vulnerability of input parameters being not strictly verified in the input. Successful exploitation of this vulnerability may cause the launcher to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:11:18.525Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46755", "datePublished": "2023-11-08T10:11:18.525Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-03T20:34:53.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:12:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40010", "datePublished": "2022-01-07T22:39:40", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51513
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51513", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:32.743289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:49.262Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of processes not being fully terminated in the VPN module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect power consumption." } ], "value": "Vulnerability of processes not being fully terminated in the VPN module\nImpact: Successful exploitation of this vulnerability will affect power consumption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:42:57.062Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51513", "datePublished": "2024-11-05T08:42:57.062Z", "dateReserved": "2024-10-29T01:43:54.524Z", "dateUpdated": "2024-11-05T14:53:49.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44108", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T17:56:18.332635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T17:58:04.587Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:08:10.395Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44108", "datePublished": "2023-10-11T12:08:10.395Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T17:58:04.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46319
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46319", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39966
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized AOD driver structure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized AOD driver structure" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39966", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40065
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40065", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic error vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40065", "datePublished": "2022-04-11T19:38:24", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1692
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:10:55.121Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1692", "datePublished": "2023-05-20T14:10:55.121Z", "dateReserved": "2023-03-29T09:29:50.057Z", "dateUpdated": "2024-08-02T05:57:25.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44553
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44553", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22254
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22254", "datePublished": "2022-04-11T19:38:21", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40002", "datePublished": "2022-01-07T22:39:27", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22458
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22458", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22458", "datePublished": "2021-10-28T12:33:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52552
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52552", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:54:32.665219Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T20:00:53.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the power module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Input verification vulnerability in the power module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:58:38.190Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52552", "datePublished": "2024-04-08T08:58:38.190Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-20T20:00:53.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46325
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46325", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37066
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37066", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37066", "datePublished": "2021-12-07T16:03:06", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37092
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37092", "datePublished": "2021-12-08T14:13:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52554
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52554", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:12:54.929330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T20:04:07.961Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Bluetooth module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Bluetooth module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:01:09.572Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52554", "datePublished": "2024-04-08T09:01:09.572Z", "dateReserved": "2024-02-27T03:41:51.383Z", "dateUpdated": "2024-11-05T20:04:07.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46762
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46762", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:35:00.502651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:36:31.487Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:32:04.437Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46762", "datePublished": "2023-11-08T09:32:04.437Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:36:31.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22465
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Heap-based Buffer Overflow vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22465", "datePublished": "2021-10-28T12:31:53", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34154
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in HUAWEI VR screen projection.Successful exploitation of this vulnerability will cause third-party apps to create windows in an arbitrary way, consuming system resources." } ], "value": "Vulnerability of undefined permissions in HUAWEI VR screen projection.Successful exploitation of this vulnerability will cause third-party apps to create windows in an arbitrary way, consuming system resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-16T06:54:01.644Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34154", "datePublished": "2023-06-16T06:54:01.644Z", "dateReserved": "2023-05-29T09:03:29.115Z", "dateUpdated": "2024-08-02T16:01:54.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37019
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:23:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37019", "datePublished": "2021-11-23T15:23:33", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48508
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity." } ], "value": " Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:21:04.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48508", "datePublished": "2023-07-06T12:21:04.259Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39980
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39980", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39980", "datePublished": "2022-01-03T21:07:25", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34163
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34163", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39009", "datePublished": "2022-09-16T17:57:50", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22441
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:10:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22441", "datePublished": "2022-02-25T18:10:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:05:50.005560Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:06:27.540Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:59:01.687Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44111", "datePublished": "2023-10-11T11:59:01.687Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:06:27.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47976
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections." } ], "problemTypes": [ { "descriptions": [ { "description": "Control connection replacement vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47976", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-03T15:02:36.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:25:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37004", "datePublished": "2021-11-23T15:25:38", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46881
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46881", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52364
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52364", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:22:28.968203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T17:49:02.979Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "value": "Vulnerability of input parameters being not strictly verified in the RSMC module.\nImpact: Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:21:32.876Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52364", "datePublished": "2024-04-08T09:21:32.876Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-11-01T17:49:02.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51514
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51514", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:23.958757Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:41.393Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of pop-up windows belonging to no app in the VPN module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of pop-up windows belonging to no app in the VPN module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:59:40.741Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51514", "datePublished": "2024-11-05T08:59:40.741Z", "dateReserved": "2024-10-29T01:43:54.524Z", "dateUpdated": "2024-11-05T14:53:41.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39981
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call." } ], "problemTypes": [ { "descriptions": [ { "description": " Security Features", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39981", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Security Features" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39981", "datePublished": "2022-01-03T21:07:25", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:01:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37011", "datePublished": "2021-12-07T16:01:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4565
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-4565", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:52:57.918108Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:58:51.981Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the framework module. Successful exploitation of this vulnerability may cause the hotspot feature to be unavailable." } ], "value": "Broadcast permission control vulnerability in the framework module. Successful exploitation of this vulnerability may cause the hotspot feature to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:25:36.605Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-4565", "datePublished": "2023-09-26T01:25:36.605Z", "dateReserved": "2023-08-28T12:18:27.503Z", "dateUpdated": "2024-09-24T17:58:51.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52360
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52360", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:25:16.451936Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T17:20:17.770Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Logic vulnerabilities in the baseband.Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Logic vulnerabilities in the baseband.Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:58:49.848Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52360", "datePublished": "2024-02-18T02:58:49.848Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-08-02T22:55:41.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41297
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41297", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:16:34.540132Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:16:44.175Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking." } ], "value": "Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:39:06.939Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41297", "datePublished": "2023-09-25T11:39:06.939Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:16:44.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:25:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37012", "datePublished": "2021-11-23T15:25:18", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46321
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46321", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52541
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52541", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-31T15:03:18.996179Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T15:05:06.846Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Authentication vulnerability in the API for app pre-loading.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Authentication vulnerability in the API for app pre-loading.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:47:29.919Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52541", "datePublished": "2024-04-08T08:47:29.919Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-10-31T15:05:06.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:23:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37003", "datePublished": "2021-11-23T15:23:12", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22451
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22451", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22451", "datePublished": "2021-10-28T12:31:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46785
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:01:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46785", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46785", "datePublished": "2022-05-13T15:01:58", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:58.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48298", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:58.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.450Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:21:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37009", "datePublished": "2021-11-23T15:21:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46766
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46766", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:22:22.671109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:24:05.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:16:02.973Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46766", "datePublished": "2023-11-08T09:16:02.973Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-09-04T19:24:05.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37096
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37096", "datePublished": "2021-12-07T16:06:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46882
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46882", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41592
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41592", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52100
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Celia Keyboard module has a vulnerability in access control. Successful exploitation of this vulnerability may affect availability." } ], "value": "The Celia Keyboard module has a vulnerability in access control. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:15:58.942Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52100", "datePublished": "2024-01-16T09:15:58.942Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52114", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:16:31.632593Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:27:35.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data confidentiality vulnerability in the ScreenReader module. Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Data confidentiality vulnerability in the ScreenReader module. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:21:37.633Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52114", "datePublished": "2024-01-16T08:21:37.633Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-27T15:27:35.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41593
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41593", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40064
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.704Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40064", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40064", "datePublished": "2022-03-07T13:49:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Verification bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Verification bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37008", "datePublished": "2022-08-09T20:10:47", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31759
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Accessing uninitialized pointers vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:56:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Accessing uninitialized pointers vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31759", "datePublished": "2022-06-13T14:56:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38999
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper update of reference count vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper update of reference count vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38999", "datePublished": "2022-09-16T17:57:38", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49245
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:00:03.721Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49245", "datePublished": "2023-12-06T09:00:03.721Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:45.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44119
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44119", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:11:44.943462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:11:53.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-667", "description": "CWE-667 Improper Locking", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:04:19.002Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44119", "datePublished": "2023-10-11T12:04:19.002Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-19T13:11:53.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48488
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48488", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39979
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39979", "datePublished": "2022-01-03T21:07:24", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37005", "datePublished": "2022-08-09T20:11:06", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37071
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37071", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Business Logic Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37071", "datePublished": "2021-12-07T16:03:52", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37049", "datePublished": "2021-12-08T14:12:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39405
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39405", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:25:00.796235Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:25:55.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of out-of-bounds parameter read/write in the Wi-Fi module. Successful exploitation of this vulnerability may cause other apps to be executed with escalated privileges." } ], "value": "Vulnerability of out-of-bounds parameter read/write in the Wi-Fi module. Successful exploitation of this vulnerability may cause other apps to be executed with escalated privileges." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:37:24.597Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39405", "datePublished": "2023-08-13T11:37:24.597Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-10T14:25:55.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37065
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37065", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37065", "datePublished": "2021-12-07T16:03:01", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39970
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39970", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39970", "datePublished": "2022-01-03T21:07:20", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46314
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46314", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37116
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37116", "datePublished": "2022-01-03T21:07:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40018
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.444Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Null Pointer Reference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null Pointer Reference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40018", "datePublished": "2022-01-07T22:39:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.444Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46894
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the uinput module.Successful exploitation of this vulnerability may lead to kernel privilege escalation." } ], "value": "Use After Free (UAF) vulnerability in the uinput module.Successful exploitation of this vulnerability may lead to kernel privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:23:59.118Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46894", "datePublished": "2023-07-06T12:23:59.118Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-08-04T05:17:42.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37077
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37077", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37077", "datePublished": "2021-12-07T16:04:14", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48346
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48346", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46328
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46328", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37090
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37090", "datePublished": "2021-12-07T16:06:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37133
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "9.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37133", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "9.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1.1" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37133", "datePublished": "2022-01-03T21:07:40", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:03.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22429
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22429", "datePublished": "2022-02-25T18:11:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38994", "datePublished": "2022-09-16T17:56:57", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41577
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41577", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52716
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:36.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52716", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T19:05:03.166002Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T15:09:48.227Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:01:32.933Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52716", "datePublished": "2024-04-07T09:01:32.933Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-09-13T15:09:48.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45442
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:27:11.335619Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:27:20.571Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:38:53.322Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45442", "datePublished": "2024-09-04T01:38:53.322Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:27:20.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52367
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:32:35.749077Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-27T20:18:12.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:32:08.585Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52367", "datePublished": "2024-02-18T03:32:08.585Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38984
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38984", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37025
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:25:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37025", "datePublished": "2021-11-23T15:25:55", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44105
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44105", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:11:19.881014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:11:26.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permissions not being strictly verified in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of permissions not being strictly verified in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:06:03.840Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44105", "datePublished": "2023-10-11T12:06:03.840Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-19T13:11:26.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40014
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:06:11.966Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40014", "datePublished": "2022-01-07T22:39:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-7271
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7271", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:28:07.668981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:54:33.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the NMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the NMS module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:49:14.969Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-7271", "datePublished": "2024-07-25T11:49:14.969Z", "dateReserved": "2024-07-08T10:53:54.124Z", "dateUpdated": "2024-08-02T08:57:35.022Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46786
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46786", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds memory access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46786", "datePublished": "2022-05-13T15:02:16", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52387
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52387", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T17:04:49.426374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:46.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Sensitive Information in Resource Not Removed Before Reuse", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:52:24.454Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52387", "datePublished": "2024-02-18T02:52:24.454Z", "dateReserved": "2024-01-26T06:51:31.238Z", "dateUpdated": "2024-08-02T22:55:41.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48513
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the Gallery module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "value": "Vulnerability of identity verification being bypassed in the Gallery module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:42:55.069Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48513", "datePublished": "2023-07-06T12:42:55.069Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46893
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity." } ], "value": "Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "unstrict data verification and parameter check", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:17:19.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46893", "datePublished": "2023-07-05T12:17:19.514Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-08-04T05:17:42.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41585
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41585", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42031
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42031", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T15:24:44.947651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T15:25:50.230Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Settings module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Settings module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:02:51.806Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42031", "datePublished": "2024-08-08T08:56:57.339Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T15:25:50.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22467
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22467", "datePublished": "2021-10-28T12:33:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44560
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified." } ], "problemTypes": [ { "descriptions": [ { "description": "Intent redirection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44560", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49241
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "API permission control vulnerability in the network management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "API permission control vulnerability in the network management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:48:18.923Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49241", "datePublished": "2023-12-06T08:48:18.923Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22256
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22256", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22256", "datePublished": "2022-04-11T19:38:19", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37095
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37095", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37095", "datePublished": "2021-12-07T16:06:22", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52370
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52370", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:28:38.235755Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T17:15:54.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.516Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access." } ], "value": "Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:41:29.209Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52370", "datePublished": "2024-02-18T03:41:29.209Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34158
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34158", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:53.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32999
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32999", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:47:09.626581Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:16.031Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cracking vulnerability in the OS security module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Cracking vulnerability in the OS security module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:12:07.046Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32999", "datePublished": "2024-05-11T10:12:07.046Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22419
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Verification of Data Authenticity", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:20:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22419", "datePublished": "2021-08-03T17:20:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39384
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "13.0..0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39384", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:09:02.426531Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:13:33.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete permission verification in the input method module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of incomplete permission verification in the input method module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:45:05.132Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39384", "datePublished": "2023-08-13T11:45:05.132Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:13:33.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52098", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T15:18:04.751382Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:18:51.409Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of Service (DoS) vulnerability in the DMS module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Denial of Service (DoS) vulnerability in the DMS module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:08:10.154Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52098", "datePublished": "2024-01-16T09:08:10.154Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-10-23T15:18:51.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41601
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41601", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ], "problemTypes": [ { "descriptions": [ { "description": "Parameter injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Parameter injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37040", "datePublished": "2021-12-08T14:11:56", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22456
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22456", "datePublished": "2021-10-28T12:31:47", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37051", "datePublished": "2021-12-08T14:12:25", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39396
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39396", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:26:55.311412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:28:38.710Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:35:42.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39396", "datePublished": "2023-08-13T11:35:42.259Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T14:28:38.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52101
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Component exposure vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Component exposure vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete List of Disallowed Inputs", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:17:44.624Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52101", "datePublished": "2024-01-16T09:17:44.624Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48510
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the AMS module. Successful exploitation of this vulnerability will cause unauthorized operations." } ], "value": "Input verification vulnerability in the AMS module. Successful exploitation of this vulnerability will cause unauthorized operations." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:39:00.248Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48510", "datePublished": "2023-07-06T12:39:00.248Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52542
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52542", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:23:02.155930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-31T17:49:45.855Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:48:33.106Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52542", "datePublished": "2024-04-08T08:48:33.106Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-10-31T17:49:45.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Preservation of Permissions vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:27:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Preservation of Permissions vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37006", "datePublished": "2021-11-23T15:27:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41588
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic exception vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41588", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48289
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48289", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38985
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38985", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52539
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52539", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T16:16:28.000372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-15T16:22:11.397Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the Settings module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in the Settings module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:45:14.929Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52539", "datePublished": "2024-04-08T08:45:14.929Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-15T16:22:11.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52719
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52719", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:52:33.414498Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:43.367Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:34.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the PMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Privilege escalation vulnerability in the PMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:58:21.254Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52719", "datePublished": "2024-05-11T09:58:21.254Z", "dateReserved": "2024-04-23T03:42:13.136Z", "dateUpdated": "2024-08-02T23:11:34.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39975
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39975", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39975", "datePublished": "2022-01-03T21:07:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51511
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51511", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:46.055962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:54:07.708Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameter type not being verified in the WantAgent module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of parameter type not being verified in the WantAgent module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:37:05.745Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51511", "datePublished": "2024-11-05T08:37:05.745Z", "dateReserved": "2024-10-29T01:43:54.523Z", "dateUpdated": "2024-11-05T14:54:07.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Read/Write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Read/Write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34742", "datePublished": "2022-07-11T13:53:29", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44563
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44563", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37070
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37070", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37070", "datePublished": "2021-12-07T16:03:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.358Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-06T12:54:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22295", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22295", "datePublished": "2021-08-06T12:54:49", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48515
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of inappropriate permission control in Nearby. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of inappropriate permission control in Nearby. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:46:13.191Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48515", "datePublished": "2023-07-06T12:46:13.191Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52713
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52713", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:42:49.196947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:53:45.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:41:49.250Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52713", "datePublished": "2024-04-07T08:41:49.250Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-11-14T19:53:45.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38986
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38986", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22319
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22319", "datePublished": "2022-02-25T18:11:05", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46740", "datePublished": "2022-04-11T19:38:23", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:41.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31225
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Gallery app has the risk of hijacking attacks. Successful exploitation of this vulnerability may cause download failures and affect product availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31225", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-02T14:53:31.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52537
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52537", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:58:46.739019Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-01T14:01:16.101Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the HwIms module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of package name verification being bypassed in the HwIms module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:40:37.167Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52537", "datePublished": "2024-04-08T08:40:37.167Z", "dateReserved": "2024-02-27T03:41:51.380Z", "dateUpdated": "2024-08-02T23:03:20.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46323
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46323", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38988
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38988", "datePublished": "2022-09-16T17:56:28", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39389
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39389", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:33:03.841704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1285", "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:37:21.887Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:30:51.872Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39389", "datePublished": "2023-08-13T11:30:51.872Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:37:21.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51522
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51522", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:05:04.224024Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:05:11.844Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper device information processing in the device management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper device information processing in the device management module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-199", "description": "CWE-199 Information Management Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:13:41.926Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51522", "datePublished": "2024-11-05T09:13:41.926Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T15:05:11.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:41:47.947Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44109", "datePublished": "2023-10-11T10:41:47.947Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-08-02T19:59:50.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46757
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46757", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:33:54.599385Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:34:24.081Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The remote PIN module has a vulnerability that causes incorrect information storage locations.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The remote PIN module has a vulnerability that causes incorrect information storage locations.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T07:50:55.380Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46757", "datePublished": "2023-11-08T10:13:49.070Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:34:24.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40006
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.\u003c/p\u003e" } ], "value": "Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-254", "description": "CWE-254 7PK - Security Features", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:50:52.820Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint module has a security risk of brute force cracking. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security Features" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40006", "datePublished": "2022-01-07T22:39:30", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39670
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39670", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:54:55.648338Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T14:01:13.034Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the account synchronisation module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the account synchronisation module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:45:24.377Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39670", "datePublished": "2024-07-25T11:45:24.377Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38979
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38979", "datePublished": "2022-09-16T17:56:43", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37086
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Preservation of Permissions vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Preservation of Permissions vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37086", "datePublished": "2021-12-07T16:05:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37111
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leakage" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37111", "datePublished": "2022-01-03T21:07:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22255
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Common DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Common DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22255", "datePublished": "2022-04-11T19:38:20", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37053", "datePublished": "2021-12-08T14:12:34", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22261
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22261", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22261", "datePublished": "2022-05-13T15:03:44", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38980
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwAirlink module has a heap overflow vulnerability in processing data packets of the proprietary protocol.Successful exploitation of this vulnerability may allow attackers to obtain process control permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38980", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41306
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41306", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:49:09.768594Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:49:21.601Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable." } ], "value": "Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:14:26.222Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41306", "datePublished": "2023-09-26T01:14:26.222Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T18:49:21.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22452
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22452", "datePublished": "2021-10-28T12:32:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5464
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5464", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-18T15:30:32.565891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-18T15:39:14.019Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insufficient permission verification in the NearLink module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of insufficient permission verification in the NearLink module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:29:51.982Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-5464", "datePublished": "2024-06-14T07:29:51.982Z", "dateReserved": "2024-05-29T07:57:39.735Z", "dateUpdated": "2024-08-01T21:11:12.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51515
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51515", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:18.528264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:34.113Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the kernel network module\u003cbr\u003eImpact:Successful exploitation of this vulnerability may affect availability." } ], "value": "Race condition vulnerability in the kernel network module\nImpact:Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:00:52.888Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51515", "datePublished": "2024-11-05T09:00:52.888Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:34.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36503
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36503", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T13:39:26.960168Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T13:39:52.624Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory management vulnerability in the Gralloc module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Memory management vulnerability in the Gralloc module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:25:07.573Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36503", "datePublished": "2024-06-14T07:25:07.573Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:42:48.264903Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T21:03:20.579Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:54:08.330Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52097", "datePublished": "2024-02-18T02:54:08.330Z", "dateReserved": "2023-12-27T02:33:15.059Z", "dateUpdated": "2024-11-12T21:03:20.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46867
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.738Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46867", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-04T05:17:42.738Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42034
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42034", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:08:42.401805Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:09:16.945Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "LaunchAnywhere vulnerability in the account module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "LaunchAnywhere vulnerability in the account module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:23:38.895Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42034", "datePublished": "2024-08-08T09:23:38.895Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T13:09:16.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37128
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37128", "datePublished": "2022-01-03T21:07:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/cve/CVE-2021-22296" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system." } ], "problemTypes": [ { "descriptions": [ { "description": "Attempt to Access Child of a Non-structure Pointer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-04T21:48:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/cve/CVE-2021-22296" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22296", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Attempt to Access Child of a Non-structure Pointer" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" }, { "name": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" }, { "name": "https://www.tenable.com/cve/CVE-2021-22296", "refsource": "MISC", "url": "https://www.tenable.com/cve/CVE-2021-22296" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22296", "datePublished": "2021-03-02T18:08:24", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48359
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The recovery mode for updates has a vulnerability that causes arbitrary disk modification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary disk modification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48359", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22431
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22431", "datePublished": "2022-02-25T18:11:09", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46890
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T11:52:24.005Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46890", "datePublished": "2023-07-05T11:52:24.005Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-08-04T05:17:42.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40047
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Release of Resource after Effective Lifetime" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40047", "datePublished": "2022-03-07T13:51:07", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26547
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:54.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The InputMethod module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26547", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-02T11:53:54.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40031", "datePublished": "2022-01-07T22:39:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38992
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38992", "datePublished": "2022-09-16T17:56:55", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.830Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44114", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:04:31.739616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:05:06.617Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:00:14.247Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44114", "datePublished": "2023-10-11T12:00:14.247Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:05:06.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52105
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52105", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:16:57.198374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:23:13.538Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The nearby module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect availability." } ], "value": "The nearby module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:24:52.058Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52105", "datePublished": "2024-01-16T09:24:52.058Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-27T15:23:13.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40004", "datePublished": "2022-01-07T22:39:29", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5801
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:24.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5801", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:59:47.994949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T15:00:19.886Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:48:14.529Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-5801", "datePublished": "2023-11-08T02:48:14.529Z", "dateReserved": "2023-10-26T11:33:07.080Z", "dateUpdated": "2024-09-04T15:00:19.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48300
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.750Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48300", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52369
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T18:52:30.707849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:34.080Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stack overflow vulnerability in the NFC module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Stack overflow vulnerability in the NFC module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:39:56.203Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52369", "datePublished": "2024-02-18T03:39:56.203Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34743
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34743", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34743", "datePublished": "2022-07-11T13:53:04", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45449
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:07:40.451445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:07:58.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the ringtone setting module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the ringtone setting module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:21:12.057Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45449", "datePublished": "2024-09-04T02:21:12.057Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:07:58.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37021
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37021", "datePublished": "2021-12-07T16:02:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37068
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.791Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "Resource Management Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Resource Management Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37068", "datePublished": "2021-12-07T16:03:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48517
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:48:51.135Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48517", "datePublished": "2023-07-06T12:48:51.135Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-08-03T15:17:54.513Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:24:07.748Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52116", "datePublished": "2024-01-16T08:24:07.748Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39394
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39394", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:48:29.702173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T13:49:18.573Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of API privilege escalation in the wifienhance module. Successful exploitation of this vulnerability may cause the arp list to be modified." } ], "value": "Vulnerability of API privilege escalation in the wifienhance module. Successful exploitation of this vulnerability may cause the arp list to be modified." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:26:40.032Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39394", "datePublished": "2023-08-13T12:26:40.032Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T13:49:18.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37089
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37089", "datePublished": "2021-12-07T16:05:54", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46836
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information leakage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information leakage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46836", "datePublished": "2022-09-16T17:55:42", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-04T05:17:42.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34167
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Vulnerability of spoofing trustlists of Huawei desktop", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34167", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40021
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write " } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40021", "datePublished": "2022-01-07T22:39:43", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39403
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39403", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:16.944928Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:30:27.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358 Improperly Implemented Security Check for Standard", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:40:18.157Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39403", "datePublished": "2023-08-13T12:40:18.157Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:30:27.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51527
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51527", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:47.882951Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:48.790Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Gallery app\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Gallery app\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:25:27.127Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51527", "datePublished": "2024-11-05T09:25:27.127Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:48.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41310
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41310", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:48:13.867695Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:48:23.529Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background." } ], "value": "Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:20:44.416Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41310", "datePublished": "2023-09-26T01:20:44.416Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-24T18:48:23.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46767
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46767", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:27:13.516034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:28:35.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:27:46.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46767", "datePublished": "2023-11-08T09:27:46.514Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-09-04T19:28:35.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52545
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52545", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:11:24.279500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T16:51:53.780Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in the Calendar app.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of undefined permissions in the Calendar app.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:53:09.751Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52545", "datePublished": "2024-04-08T08:53:09.751Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-26T16:51:53.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34741", "datePublished": "2022-07-11T13:53:17", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52107
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52107", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T14:35:55.614449Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:36:28.905Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permissions being not strictly verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of permissions being not strictly verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:25:30.312Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52107", "datePublished": "2024-01-16T08:25:30.312Z", "dateReserved": "2023-12-27T02:33:17.231Z", "dateUpdated": "2024-08-29T14:36:28.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37063
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Cryptographic Issues vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37063", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cryptographic Issues vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37063", "datePublished": "2021-12-07T16:02:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37058
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user\u0027s nickname is maliciously tampered with." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions,Privileges,and Access Controls vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user\u0027s nickname is maliciously tampered with." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permissions,Privileges,and Access Controls vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37058", "datePublished": "2021-12-07T16:02:21", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52717
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T19:17:39.146898Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:48.930Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the lock screen module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the lock screen module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:03:06.815Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52717", "datePublished": "2024-04-07T09:03:06.815Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-08-02T23:11:35.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40009", "datePublished": "2022-01-07T22:39:33", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37085
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.752Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Encoding timing vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Encoding timing vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37085", "datePublished": "2021-12-07T16:05:10", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48613
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:08:52.581746Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:10:17.357Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the kernel module. Successful exploitation of this vulnerability may cause variable values to be read with the condition evaluation bypassed." } ], "value": "Race condition vulnerability in the kernel module. Successful exploitation of this vulnerability may cause variable values to be read with the condition evaluation bypassed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:08:56.211Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48613", "datePublished": "2023-11-08T09:08:56.211Z", "dateReserved": "2023-10-26T12:17:08.302Z", "dateUpdated": "2024-09-04T19:10:17.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37094
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37094", "datePublished": "2021-12-07T16:06:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40026", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22425
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:20:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22425", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22425", "datePublished": "2021-08-03T17:20:00", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48360
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in file permission control. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48360", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37023
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:26:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37023", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network.." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37023", "datePublished": "2021-11-23T15:26:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37239
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program." } ], "value": "Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:27:38.720Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37239", "datePublished": "2023-07-06T12:27:38.720Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-08-02T17:09:34.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45443
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:34:30.256008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:34:39.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Directory traversal vulnerability in the cust module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Directory traversal vulnerability in the cust module\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:49:51.125Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45443", "datePublished": "2024-09-04T01:49:51.125Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:34:39.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44101
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44101", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:25:06.798507Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:26:27.153Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:48:56.203Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44101", "datePublished": "2023-10-11T11:48:56.203Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:26:27.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44546
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Update of Reference Count", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44546", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Exception log vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exception log vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37052", "datePublished": "2021-12-08T14:12:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52363
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52363", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-15T20:26:49.124607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:56.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the Control Panel module.Successful exploitation of this vulnerability may cause app processes to be started by mistake." } ], "value": "Vulnerability of defects introduced in the design process in the Control Panel module.Successful exploitation of this vulnerability may cause app processes to be started by mistake." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:02:13.754Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52363", "datePublished": "2024-02-18T03:02:13.754Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-08-02T22:55:41.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37067
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:03:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37067", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37067", "datePublished": "2021-12-07T16:03:12", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34157
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app." } ], "value": "Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-16T06:55:57.262Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34157", "datePublished": "2023-06-16T06:55:57.262Z", "dateReserved": "2023-05-29T09:03:29.116Z", "dateUpdated": "2024-08-02T16:01:54.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40052", "datePublished": "2022-03-07T13:50:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39000
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious app control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious app control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39000", "datePublished": "2022-09-16T17:55:46", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39387
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39387", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:01:25.944023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:02:20.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "value": "Vulnerability of permission control in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:22:52.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39387", "datePublished": "2023-08-13T12:22:52.628Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:02:20.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40027
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:02:50.922Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40027", "datePublished": "2022-01-07T22:39:45", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39397
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39397", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:05:03.456139Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:56.634Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "value": "Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:32:43.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39397", "datePublished": "2023-08-13T12:32:43.081Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:56.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51529
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51529", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:33.594311Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:51:53.664Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data verification vulnerability in the battery module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect function stability." } ], "value": "Data verification vulnerability in the battery module\nImpact: Successful exploitation of this vulnerability may affect function stability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T11:18:31.133Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51529", "datePublished": "2024-11-05T11:18:31.133Z", "dateReserved": "2024-10-29T01:43:54.527Z", "dateUpdated": "2024-11-05T14:51:53.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44547
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44547", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41586
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Untruncated data vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41586", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46840
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46840", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52546
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52546", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:06:54.177202Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:38.995Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the Calendar app.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of package name verification being bypassed in the Calendar app.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:54:05.956Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52546", "datePublished": "2024-04-08T08:54:05.956Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-02T23:03:21.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31226
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:30.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SDK for the MediaPlaybackController module has improper permission verification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31226", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-02T14:53:30.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37045", "datePublished": "2021-12-08T14:12:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46883
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46883", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22418
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:21:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22418", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22418", "datePublished": "2021-08-03T17:21:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47974
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47974", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-03T15:02:36.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48296", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37075
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Credentials Management Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Credentials Management Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37075", "datePublished": "2021-12-08T14:13:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Invalid address access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Invalid address access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37037", "datePublished": "2021-12-08T14:11:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled resource consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T14:05:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 12.0.0,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled resource consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40011", "datePublished": "2022-01-07T22:39:31", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52543
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52543", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:39:59.047820Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T16:03:30.857Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.786Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:49:44.807Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52543", "datePublished": "2024-04-08T08:49:44.807Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-11-07T16:03:30.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36499
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36499", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T16:18:23.453375Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T16:18:31.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized screenshot capturing in the WMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of unauthorized screenshot capturing in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:17:27.308Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36499", "datePublished": "2024-06-14T07:17:27.308Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46762
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46762", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-07T00:00:00", "dateUpdated": "2024-08-03T14:39:38.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40022
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40022", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40022", "datePublished": "2022-01-07T22:39:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44106", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:11:11.666352Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:15:30.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:55:10.352Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44106", "datePublished": "2023-10-11T11:55:10.352Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:15:30.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37240
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nVulnerability of missing input length verification in the distributed file system. Successful exploitation of this vulnerability may cause out-of-bounds read.\n\n" } ], "value": "\nVulnerability of missing input length verification in the distributed file system. Successful exploitation of this vulnerability may cause out-of-bounds read.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:29:12.863Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37240", "datePublished": "2023-07-06T12:29:12.863Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-08-02T17:09:34.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46787
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46787", "datePublished": "2022-05-13T15:02:34", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44102
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44102", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:24:00.309066Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:24:20.522Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:50:20.615Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44102", "datePublished": "2023-10-11T11:50:20.615Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:24:20.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32996
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32996", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:48:50.532409Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:49:53.728Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the account module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the account module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:02:22.311Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32996", "datePublished": "2024-05-11T10:02:22.311Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44093
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44093", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:54:16.763490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:54:59.613Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package names\u0027 public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of package names\u0027 public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Critical Step in Authentication", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:36:21.500Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44093", "datePublished": "2023-10-11T10:36:21.500Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:54:59.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39393
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39393", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:29:25.730418Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:30:08.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insecure signatures in the ServiceWifiResources module. Successful exploitation of this vulnerability may cause ServiceWifiResources to be maliciously modified and overwritten." } ], "value": "Vulnerability of insecure signatures in the ServiceWifiResources module. Successful exploitation of this vulnerability may cause ServiceWifiResources to be maliciously modified and overwritten." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:34:33.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39393", "datePublished": "2023-08-13T11:34:33.081Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T14:30:08.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40001", "datePublished": "2022-01-07T22:39:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37039", "datePublished": "2021-12-08T14:11:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46763
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46763", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:53:04.488901Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:55:04.015Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of background app permission management in the framework module. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "value": "Vulnerability of background app permission management in the framework module. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:33:20.439Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46763", "datePublished": "2023-11-08T09:33:20.439Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T14:55:04.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52551
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52551", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:20:22.094222Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T18:41:43.394Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:57:32.246Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52551", "datePublished": "2024-04-08T08:57:32.246Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-11-01T18:41:43.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37112
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak." } ], "problemTypes": [ { "descriptions": [ { "description": " External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37112", "datePublished": "2022-01-03T21:07:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39408
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39408", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:20:43.725122Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:21:17.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T08:51:09.991Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39408", "datePublished": "2023-09-25T08:51:09.991Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T14:21:17.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience." } ], "problemTypes": [ { "descriptions": [ { "description": " Stack-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39990", "datePublished": "2022-01-03T21:07:39", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46318
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings." } ], "problemTypes": [ { "descriptions": [ { "description": "Function logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46318", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42039
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42039", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:04.070540Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:32:13.990Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the SystemUI module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the SystemUI module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:35:23.145Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42039", "datePublished": "2024-09-04T01:35:23.145Z", "dateReserved": "2024-07-27T06:52:58.402Z", "dateUpdated": "2024-09-04T13:32:13.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49242
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:49:41.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49242", "datePublished": "2023-12-06T08:49:41.628Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45441
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45441", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:27:38.331736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:27:47.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the system service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Input verification vulnerability in the system service module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:37:25.340Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45441", "datePublished": "2024-09-04T01:37:25.340Z", "dateReserved": "2024-08-29T06:19:14.881Z", "dateUpdated": "2024-09-04T13:27:47.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46310
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.944Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Obtaining values vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46310", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34161
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34161", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26548
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The pgmng module has a vulnerability in serialization/deserialization. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26548", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-02T11:53:53.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52386
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52386", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:50:05.968405Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:33.674Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:19:57.110Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52386", "datePublished": "2024-04-08T09:19:57.110Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38978
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38978", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38978", "datePublished": "2022-09-16T17:56:37", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46773
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the PMS module. Successful exploitation of this vulnerability may cause privilege escalation." } ], "value": "Permission management vulnerability in the PMS module. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:31:12.555Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46773", "datePublished": "2023-12-06T08:31:12.555Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-08-02T20:53:21.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:24:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37005", "datePublished": "2021-11-23T15:24:38", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39978
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues." } ], "problemTypes": [ { "descriptions": [ { "description": "SQL Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39978", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39978", "datePublished": "2022-01-03T21:07:23", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "value": "The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds read/write vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T06:01:46.922Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48312", "datePublished": "2023-04-16T06:01:46.922Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2024-08-03T15:10:59.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52359
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52359", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:51:19.654353Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:58.620Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification in some APIs in the ActivityTaskManagerService module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of permission verification in some APIs in the ActivityTaskManagerService module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:51:03.625Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52359", "datePublished": "2024-04-08T08:51:03.625Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-08-02T22:55:41.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38987
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38987", "datePublished": "2022-09-16T17:55:59", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29792
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Serial number obtaining vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Serial number obtaining vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29792", "datePublished": "2022-05-13T15:04:46", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42035
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42035", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T12:54:40.486843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T12:57:08.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the App Multiplier module\u003cbr\u003eImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality." } ], "value": "Permission control vulnerability in the App Multiplier module\nImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:26:10.805Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42035", "datePublished": "2024-08-08T09:26:10.805Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T12:57:08.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1695
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:51:58.425Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1695", "datePublished": "2023-07-06T12:51:58.425Z", "dateReserved": "2023-03-29T09:29:53.740Z", "dateUpdated": "2024-08-02T05:57:25.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46851
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46851", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-04T05:17:42.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31763
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:00.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds array vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds array vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31763", "datePublished": "2022-06-13T14:55:11", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:00.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32993
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32993", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:49:49.403661Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:35.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the memory module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds access vulnerability in the memory module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:56:03.872Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32993", "datePublished": "2024-05-11T09:56:03.872Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38993", "datePublished": "2022-09-16T17:55:53", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46761
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46761", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-07T00:00:00", "dateUpdated": "2024-08-03T14:39:38.968Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3456
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:34:21.446Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-3456", "datePublished": "2023-07-06T12:34:21.446Z", "dateReserved": "2023-06-29T11:13:39.706Z", "dateUpdated": "2024-08-02T06:55:03.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46311
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Undefined provider vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46311", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46770
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46770", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:00:09.547396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:00:14.137Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds vulnerability in the sensor module. Successful exploitation of this vulnerability may cause mistouch prevention errors on users\u0027 mobile phones." } ], "value": "Out-of-bounds vulnerability in the sensor module. Successful exploitation of this vulnerability may cause mistouch prevention errors on users\u0027 mobile phones." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:53:45.996Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46770", "datePublished": "2023-11-08T02:53:45.996Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:00:14.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41299
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41299", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:01:53.745952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:02:14.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:41:44.258Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41299", "datePublished": "2023-09-25T11:41:44.258Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:02:14.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36500
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36500", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T19:48:38.560023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T19:53:09.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.311Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the AMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Privilege escalation vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:19:31.788Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36500", "datePublished": "2024-06-14T07:19:31.788Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.311Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39011
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39011", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22454
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22454", "datePublished": "2021-10-28T12:33:00", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37238
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of apps\u0027 permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features." } ], "value": "Vulnerability of apps\u0027 permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:26:28.737Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37238", "datePublished": "2023-07-06T12:26:28.737Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-08-02T17:09:33.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36502
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36502", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T15:31:40.711811Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:31:48.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the audio module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds read vulnerability in the audio module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:23:20.096Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36502", "datePublished": "2024-06-14T07:23:20.096Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48478
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition TA of some products lacks memory length verification. Successful exploitation of this vulnerability may cause exceptions of the facial recognition service." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202305-0000001532778780" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48478", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-03T15:17:55.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52373
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52373", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:20:36.325399Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:20:57.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification in the content sharing pop-up module.Successful exploitation of this vulnerability may cause unauthorized file sharing." } ], "value": "Vulnerability of permission verification in the content sharing pop-up module.Successful exploitation of this vulnerability may cause unauthorized file sharing." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:52:33.681Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52373", "datePublished": "2024-02-18T03:52:33.681Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41309
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41309", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:44:57.062682Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:45:08.287Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:19:07.089Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41309", "datePublished": "2023-09-26T01:19:07.089Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T17:45:08.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46891
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.840Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:15:51.878Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46891", "datePublished": "2023-07-05T12:15:51.878Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-08-04T05:17:42.840Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48519
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:54:22.659Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48519", "datePublished": "2023-07-06T12:54:22.659Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-08-03T15:17:55.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46892
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:43.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:41:21.742Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46892", "datePublished": "2023-07-06T12:41:21.742Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-08-04T05:17:43.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39391
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39391", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:53:56.356852Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T13:54:41.514Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of system file information leakage in the USB Service module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of system file information leakage in the USB Service module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:25:22.970Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39391", "datePublished": "2023-08-13T12:25:22.970Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T13:54:41.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40034
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory overwriting vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory overwriting vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40034", "datePublished": "2022-08-09T20:10:14", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22466
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Use After Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22466", "datePublished": "2021-10-28T12:32:42", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32989
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32989", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:51:23.325172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:24.753Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification vulnerability in the system sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Insufficient verification vulnerability in the system sharing pop-up module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:38:14.085Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32989", "datePublished": "2024-05-11T09:42:32.952Z", "dateReserved": "2024-04-23T03:44:12.572Z", "dateUpdated": "2024-08-02T02:27:53.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42030
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T17:50:14.258398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T17:50:23.235Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the content sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the content sharing pop-up module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T08:13:26.981Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42030", "datePublished": "2024-08-08T08:13:26.981Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-09T17:50:23.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34164
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:35:19.114Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34164", "datePublished": "2023-07-06T12:35:19.114Z", "dateReserved": "2023-05-29T09:03:29.119Z", "dateUpdated": "2024-08-02T16:01:54.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46327
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration issues", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46327", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45450
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45450", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:39.711690Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:32:51.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the software update module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the software update module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:15:38.783Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45450", "datePublished": "2024-09-04T01:15:26.814Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:32:51.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22479
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Invalid address access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:10:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22479", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Invalid address access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22479", "datePublished": "2022-02-25T18:10:59", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46774
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46774", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:14:01.196769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:19:38.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:12:36.859Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46774", "datePublished": "2023-11-08T09:12:36.859Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:19:38.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37091
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions,Privileges,and Access Controls vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37091", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permissions,Privileges,and Access Controls vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37091", "datePublished": "2021-12-07T16:06:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps." } ], "problemTypes": [ { "descriptions": [ { "description": "Bundle serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Bundle serialization/deserialization mismatch vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39008", "datePublished": "2022-09-16T17:55:34", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44550
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44550", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47290
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47290", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T16:06:55.706553Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:07:05.266Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input validation vulnerability in the USB service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Input validation vulnerability in the USB service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:15:05.972Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47290", "datePublished": "2024-09-27T10:15:05.972Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T16:07:05.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46756
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46756", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:35:06.375650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:40:08.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "value": "Permission control vulnerability in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:12:50.853Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46756", "datePublished": "2023-11-08T10:12:50.853Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:40:08.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22416
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:18:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22416", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22416", "datePublished": "2021-08-03T17:18:38", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22422
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:16:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22422", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22422", "datePublished": "2021-08-03T17:16:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5465
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5465", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T15:39:16.404798Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:39:41.731Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Function vulnerabilities in the Calendar module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Function vulnerabilities in the Calendar module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:30:57.462Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-5465", "datePublished": "2024-06-14T07:30:57.462Z", "dateReserved": "2024-05-29T07:57:46.652Z", "dateUpdated": "2024-08-01T21:11:12.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22294
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass by Spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-02T18:11:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22294", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass by Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md", "refsource": "MISC", "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2021/2021-03.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22294", "datePublished": "2021-03-02T18:11:34", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52368
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52368", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:55:19.882384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:55.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:38:36.700Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52368", "datePublished": "2024-02-18T03:38:36.700Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44562
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44562", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37079
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.729Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37079", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37079", "datePublished": "2021-12-07T16:04:24", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31755
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission preservation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31755", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission preservation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31755", "datePublished": "2022-06-13T14:56:09", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22433
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22433", "datePublished": "2022-02-25T18:11:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52365
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52365", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-19T20:33:11.393487Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:20:56.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:04:26.472Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52365", "datePublished": "2024-02-18T03:04:26.472Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-08-02T22:55:41.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37016
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:22:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37016", "datePublished": "2021-11-23T15:22:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41301
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41301", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:17:17.994354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:20:11.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:08:30.160Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41301", "datePublished": "2023-09-25T12:08:30.160Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:20:11.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46761
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46761", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:32:45.783465Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:34:26.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:31:00.389Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46761", "datePublished": "2023-11-08T09:31:00.389Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:34:26.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22318
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.508Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-14T10:46:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/console/safetyDetail?id=9145efa5d9064d94a7fc3968b6054d83\u0026pageSize=10\u0026pageIndex=1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22318", "datePublished": "2021-07-14T10:46:02", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46868
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46868", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-04T05:17:42.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31756
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Design defects vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31756", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Design defects vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31756", "datePublished": "2022-06-13T14:55:54", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37080
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37080", "datePublished": "2021-12-07T16:04:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44104", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:16:41.136828Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:17:04.450Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:52:52.971Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44104", "datePublished": "2023-10-11T11:52:52.971Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:17:04.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37044
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37044", "datePublished": "2021-12-08T14:12:01", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38997
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38997", "datePublished": "2022-09-16T17:57:08", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49243
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:56:24.442Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49243", "datePublished": "2023-12-06T08:56:24.442Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34155
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "unspecified" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "unspecified" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized calling on HUAWEI phones and tablets.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34155", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48354
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has a heap out-of-bounds write vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48354", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22478
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.004Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Resource Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:10:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Resource Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22478", "datePublished": "2022-02-25T18:10:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40055
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Man-in-the-middle attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Man-in-the-middle attack vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40055", "datePublished": "2022-03-07T13:50:15", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41598
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41598", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49240
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:06:04.495Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49240", "datePublished": "2023-12-06T09:06:04.495Z", "dateReserved": "2023-11-24T07:33:47.174Z", "dateUpdated": "2024-08-02T21:53:44.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of process priorities being raised in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of process priorities being raised in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:43:08.695Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52108", "datePublished": "2024-01-16T08:43:08.695Z", "dateReserved": "2023-12-27T02:33:17.231Z", "dateUpdated": "2024-08-02T22:48:12.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40039", "datePublished": "2022-01-07T22:39:39", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37082
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37082", "datePublished": "2021-12-07T16:04:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34740", "datePublished": "2022-07-11T13:53:10", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41589
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Interface misuse vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41589", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39989", "datePublished": "2022-01-03T21:07:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39985
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": " Improper Validation of Array Index", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:36", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39985", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Improper Validation of Array Index" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39985", "datePublished": "2022-01-03T21:07:36", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22258
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Event notification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:15:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22258", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Event notification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22258", "datePublished": "2022-04-11T19:38:18", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:10:28.595265Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:10:40.364Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the input method framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Access permission verification vulnerability in the input method framework module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:23:04.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47294", "datePublished": "2024-09-27T10:23:04.081Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:10:40.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41591
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41591", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44103
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44103", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:18:58.134949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:19:26.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:51:36.547Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44103", "datePublished": "2023-10-11T11:51:36.547Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:19:26.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37017
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:24:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37017", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37017", "datePublished": "2021-11-23T15:24:12", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.668Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46312", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51510
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51510", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:36:54.101614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:37:04.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the logo module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds access vulnerability in the logo module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:24:44.011Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51510", "datePublished": "2024-11-05T08:24:44.011Z", "dateReserved": "2024-10-29T01:43:54.523Z", "dateUpdated": "2024-11-05T15:37:04.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37113
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37113", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46856
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T09:04:20.703Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46856", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-04T05:17:42.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40051", "datePublished": "2022-03-07T13:50:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52380
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52380", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:58:37.596989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-01T14:43:31.786Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:11:55.892Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52380", "datePublished": "2024-02-18T06:11:55.892Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-01T14:43:31.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48288
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48288", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46886
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46886", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37100
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.737Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authentication vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authentication vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37100", "datePublished": "2021-12-07T16:06:39", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45447
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45447", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:11:39.883408Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:11:52.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the camera framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the camera framework module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:16:37.736Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45447", "datePublished": "2024-09-04T02:16:37.736Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:11:52.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41304
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41304", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:10:26.316499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:10:38.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window." } ], "value": "Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:56:35.365Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41304", "datePublished": "2023-10-11T11:56:35.365Z", "dateReserved": "2023-08-28T12:17:09.165Z", "dateUpdated": "2024-09-18T15:10:38.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46839
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Lack of length check vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46839", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22455
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22455", "datePublished": "2021-10-28T12:32:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41603
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41603", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52371
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52371", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:43:42.044147Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:45.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of null references in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of null references in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:42:59.747Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52371", "datePublished": "2024-02-18T03:42:59.747Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41600
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41600", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37043
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37043", "datePublished": "2021-12-07T16:02:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39005", "datePublished": "2022-09-16T17:56:07", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37018
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:24:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37018", "datePublished": "2021-11-23T15:24:58", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44118
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44118", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:12:45.649681Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:14:46.256Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:02:51.902Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44118", "datePublished": "2023-10-11T12:02:51.902Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-19T13:14:46.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39672
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39672", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:14:00.377622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T18:47:54.551Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory request logic vulnerability in the memory module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "value": "Memory request logic vulnerability in the memory module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:56:34.465Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39672", "datePublished": "2024-07-25T11:56:34.465Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38983
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38983", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T20:34:36.158193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T20:38:40.556Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:55:41.863Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52111", "datePublished": "2024-01-16T07:55:41.863Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-11-13T20:38:40.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39398
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39398", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:32.301326Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:08.662Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:34:13.949Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39398", "datePublished": "2023-08-13T12:34:13.949Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:08.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36501
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36501", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T18:19:55.777800Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T18:20:03.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory management vulnerability in the boottime module\u003cbr\u003eImpact: Successful exploitation of this vulnerability can affect integrity." } ], "value": "Memory management vulnerability in the boottime module\nImpact: Successful exploitation of this vulnerability can affect integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:21:34.942Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36501", "datePublished": "2024-06-14T07:21:34.942Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37245
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:32.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the modem pinctrl module. Successful exploitation of this vulnerability may affect the integrity and availability of the modem." } ], "value": "Buffer overflow vulnerability in the modem pinctrl module. Successful exploitation of this vulnerability may affect the integrity and availability of the modem." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:32:42.894Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37245", "datePublished": "2023-07-06T12:32:42.894Z", "dateReserved": "2023-06-29T11:07:22.824Z", "dateUpdated": "2024-08-02T17:09:32.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32991
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32991", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:35.572187Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:59.603Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the wpa_supplicant module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the wpa_supplicant module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:46:46.963Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32991", "datePublished": "2024-05-11T09:46:46.963Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-box experience bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-box experience bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37004", "datePublished": "2022-08-09T20:10:55", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29789", "datePublished": "2022-05-13T15:03:59", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44557
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44557", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48621
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-48621", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:55:10.793832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:00:41.283Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:14:48.097Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48621", "datePublished": "2024-02-18T06:14:48.097Z", "dateReserved": "2024-01-26T06:50:21.724Z", "dateUpdated": "2024-10-30T15:00:41.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52102
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-16T20:27:58.462219Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:14:38.341Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:18:53.963Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52102", "datePublished": "2024-01-16T09:18:53.963Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-10-23T15:14:38.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49239
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:04:40.379Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49239", "datePublished": "2023-12-06T09:04:40.379Z", "dateReserved": "2023-11-24T07:33:47.174Z", "dateUpdated": "2024-08-02T21:53:44.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32995
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32995", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:49:22.118972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:08.223Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of service (DoS) vulnerability in the AMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Denial of service (DoS) vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:00:18.321Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32995", "datePublished": "2024-05-11T10:00:18.321Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39973
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39973", "datePublished": "2022-01-03T21:07:43", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44558
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44558", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37126
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37126", "datePublished": "2022-01-03T21:07:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48301
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48301", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38982
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint module has service logic errors.Successful exploitation of this vulnerability will cause the phone lock to be cracked." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38982", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44099
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module. Successful exploitation of this vulnerability may cause WLAN interruption." } ], "value": "Vulnerability of data verification errors in the kernel module. Successful exploitation of this vulnerability may cause WLAN interruption." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:38:21.835Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44099", "datePublished": "2023-12-06T08:35:43.088Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-08-02T19:59:50.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52099
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52099", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T20:18:55.355916Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T20:19:07.044Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:13:24.417Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52099", "datePublished": "2024-01-16T09:13:24.417Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-11-13T20:19:07.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39381
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39381", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:19:57.143959Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:20:49.575Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Input verification vulnerability in the storage module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": " Input verification vulnerability in the storage module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:41:06.778Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39381", "datePublished": "2023-08-13T11:41:06.778Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:20:49.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41582
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41582", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39400
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39400", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:25.267703Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:36:45.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:36:38.636Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39400", "datePublished": "2023-08-13T12:36:38.636Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:36:45.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22463
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Use After Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:32:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Use After Free vulnerability . Local attackers may exploit this vulnerability to cause Kernel Information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22463", "datePublished": "2021-10-28T12:32:35", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37060
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37060", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37060", "datePublished": "2021-12-07T16:02:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22253
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper validation of integrity check values Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper validation of integrity check values Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22253", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22470
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain." } ], "problemTypes": [ { "descriptions": [ { "description": "Privileges Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:31:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privileges Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22470", "datePublished": "2021-10-28T12:31:35", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39004", "datePublished": "2022-09-16T17:56:03", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48351
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48351", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4566
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:47:38.075Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-4566", "datePublished": "2024-01-16T07:47:38.075Z", "dateReserved": "2023-08-28T12:19:16.087Z", "dateUpdated": "2024-08-02T07:31:06.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37081
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.749Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37081", "datePublished": "2021-12-07T16:04:39", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22394
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22394", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31757
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper use of APIs vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:05:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper use of APIs vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31757", "datePublished": "2022-06-13T15:05:48", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40063
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40063", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40063", "datePublished": "2022-03-07T13:49:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41311
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41311", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T13:07:17.669193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T13:07:33.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:22:20.306Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41311", "datePublished": "2023-09-26T01:22:20.306Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-25T13:07:33.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41580
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41580", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34738
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34738", "datePublished": "2022-07-11T13:53:41", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41590
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed. Successful exploitation of this vulnerability affects the smartphone availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication-related vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41590", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48352
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have data initialization issues. Successful exploitation of this vulnerability may cause a system panic." } ], "problemTypes": [ { "descriptions": [ { "description": "Data initialization vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48352", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37076
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:04:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37076", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37076", "datePublished": "2021-12-07T16:04:08", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications)." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48295", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44113", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T20:21:04.197738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T18:32:25.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing permission verification for APIs in the Designed for Reliability (DFR) module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing permission verification for APIs in the Designed for Reliability (DFR) module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:43:57.730Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44113", "datePublished": "2023-12-06T08:42:11.010Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-10-10T18:32:25.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37134
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:02.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37134", "datePublished": "2022-01-03T21:07:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:02.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48292
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "OOM vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48292", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48349
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Spoofing vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48349", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52549", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:57:08.766881Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T13:58:16.108Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:55:11.618Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52549", "datePublished": "2024-04-08T08:55:11.618Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-02T23:03:20.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22430
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22430", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22430", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37062
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37062", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37062", "datePublished": "2021-12-07T16:02:43", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51517
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51517", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:42:04.772133Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:53:19.101Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper memory access in the phone service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of improper memory access in the phone service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-129", "description": "CWE-129 Improper Validation of Array Index", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:06:04.530Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51517", "datePublished": "2024-11-05T09:06:04.530Z", "dateReserved": "2024-10-29T01:43:54.525Z", "dateUpdated": "2024-11-05T14:53:19.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6273
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:28:20.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-6273", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T20:51:10.909348Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T18:31:23.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:07:24.345Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-6273", "datePublished": "2023-12-06T09:07:24.345Z", "dateReserved": "2023-11-24T07:33:43.681Z", "dateUpdated": "2024-10-10T18:31:23.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41602
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41602", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.0.0,EMUI 10.1.0,EMUI 10.1.1,EMUI 11.0.0,EMUI 11.0.1" }, { "status": "affected", "version": "Magic UI 3.0.0,Magic UI 3.1.0,Magic UI 3.1.1,Magic UI 4.0.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 10.0.0,EMUI 10.1.0,EMUI 10.1.1,EMUI 11.0.0,EMUI 11.0.1" }, { "version_value": "Magic UI 3.0.0,Magic UI 3.1.0,Magic UI 3.1.1,Magic UI 4.0.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39996", "datePublished": "2022-01-07T22:39:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41599
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect return value vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41599", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48299
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48299", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29794
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29794", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29794", "datePublished": "2022-05-13T15:05:27", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39390
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39390", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:55:34.313756Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:00:16.996Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:24:06.704Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39390", "datePublished": "2023-08-13T12:24:06.704Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T14:00:16.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41295", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T20:44:45.781241Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:44:55.989Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim." } ], "value": "Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-12T01:10:43.001Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41295", "datePublished": "2023-09-25T11:02:55.849Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T20:44:55.989Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39984
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": " Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39984", "datePublished": "2022-01-03T21:07:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37088
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:05:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37088", "datePublished": "2021-12-07T16:05:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.771Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47291
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47291", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:12:36.216067Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:12:46.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission vulnerability in the ActivityManagerService (AMS) module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission vulnerability in the ActivityManagerService (AMS) module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:16:31.299Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47291", "datePublished": "2024-09-27T10:16:31.299Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:12:46.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40049", "datePublished": "2022-03-07T13:50:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34736
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:52:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34736", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34736", "datePublished": "2022-07-11T13:52:58", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48507
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the storage module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of identity verification being bypassed in the storage module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:36:59.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48507", "datePublished": "2023-07-06T12:36:59.628Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40003", "datePublished": "2022-01-07T22:39:28", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46759
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46759", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:22:17.571595Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:24:07.643Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the call module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the call module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:20:04.805Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46759", "datePublished": "2023-11-08T10:20:04.805Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:24:07.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37099
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37099", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37099", "datePublished": "2021-12-07T16:06:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22471
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ], "problemTypes": [ { "descriptions": [ { "description": "NULL Pointer Dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22471", "datePublished": "2021-10-28T12:33:39", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47293", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:11:20.752095Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:11:29.485Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the HAL-WIFI module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Out-of-bounds write vulnerability in the HAL-WIFI module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:21:46.924Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47293", "datePublished": "2024-09-27T10:21:46.924Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:11:29.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "OOM vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48293", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32997
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32997", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:48:12.357889Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:07.625Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the binder driver module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the binder driver module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:04:44.743Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32997", "datePublished": "2024-05-11T10:04:44.743Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22464
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:33:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202107-0000001123874808" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22464", "datePublished": "2021-10-28T12:33:32", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48357
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Some products have the double fetch vulnerability. Successful exploitation of this vulnerability may cause denial of service (DoS) attacks to the kernel." } ], "problemTypes": [ { "descriptions": [ { "description": "Double fetch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48357", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48494
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Privilege Assignment", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48494", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34156
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied." } ], "problemTypes": [ { "descriptions": [ { "description": "Services denied", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34156", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38989", "datePublished": "2022-09-16T17:56:33", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44112", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T19:23:26.143999Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:46:01.244Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:00:06.992Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44112", "datePublished": "2024-01-16T08:00:06.992Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-03T19:46:01.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22417
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-03T17:17:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22417", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Data Processing Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22417", "datePublished": "2021-08-03T17:17:14", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37097
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37097", "datePublished": "2021-12-08T14:13:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39671
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39671", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T14:58:23.436608Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T15:02:20.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the security verification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:54:42.395Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39671", "datePublished": "2024-07-25T11:54:42.395Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39673
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39673", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T15:06:32.203031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T15:06:52.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-26", "description": "CWE-26 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:40:24.640Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39673", "datePublished": "2024-07-25T11:40:24.640Z", "dateReserved": "2024-06-27T08:24:56.590Z", "dateUpdated": "2024-08-02T04:26:15.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Support for Integrity Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40045", "datePublished": "2022-02-09T22:03:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47292
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47292", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:12:04.352298Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:12:13.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the Bluetooth module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Path traversal vulnerability in the Bluetooth module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:19:33.920Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47292", "datePublished": "2024-09-27T10:19:33.920Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:12:13.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48350
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HUAWEI Messaging app has a vulnerability of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48350", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39972
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39972", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39972", "datePublished": "2022-01-03T21:07:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41293", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:10:47.087990Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:12:33.027Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-227", "description": "CWE-227: 7PK - API Abuse", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:18:42.425Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41293", "datePublished": "2023-09-25T12:18:42.425Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T15:12:33.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41584
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41584", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44116", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:01:35.724856Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:02:43.370Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized." } ], "value": "Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:01:44.161Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44116", "datePublished": "2023-10-11T12:01:44.161Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-18T15:02:43.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46317
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46317", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44552
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44552", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41578
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41578", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1694
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:13:46.239Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1694", "datePublished": "2023-05-20T14:13:46.239Z", "dateReserved": "2023-03-29T09:29:52.497Z", "dateUpdated": "2024-08-02T05:57:25.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48514
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Sepolicy module has inappropriate permission control on the use of Netlink.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Sepolicy module has inappropriate permission control on the use of Netlink.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:44:56.372Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48514", "datePublished": "2023-07-06T12:44:13.420Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:55.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45444
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45444", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:19:19.085492Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:21:46.703Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the WMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:51:49.034Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45444", "datePublished": "2024-09-04T01:51:49.034Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:21:46.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46895
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46895", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:21:38.608896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:21:45.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop." } ], "value": "Vulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:45:33.542Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46895", "datePublished": "2023-08-13T12:45:33.542Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-10-09T16:21:45.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44100
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44100", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:27:17.402567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:27:58.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:47:55.811Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44100", "datePublished": "2023-10-11T11:47:55.811Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:27:58.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46812
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:04:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46812", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46812", "datePublished": "2022-06-13T15:04:08", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44551
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Thread security vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44551", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:57:06.023Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52112", "datePublished": "2024-01-16T07:57:06.023Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38998
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38998", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39409
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39409", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:17:08.865172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:20:17.064Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T10:50:05.423Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39409", "datePublished": "2023-09-25T10:50:05.423Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T14:20:17.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48358
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The BatteryHealthActivity has a redirection vulnerability. Successful exploitation of this vulnerability by a malicious app can cause service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Redirection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48358", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51530
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51530", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:27.154731Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:51:43.931Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "LaunchAnywhere vulnerability in the account module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "LaunchAnywhere vulnerability in the account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T11:19:57.997Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51530", "datePublished": "2024-11-05T11:19:57.997Z", "dateReserved": "2024-10-29T01:43:54.528Z", "dateUpdated": "2024-11-05T14:51:43.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39674
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39674", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:29:22.273059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:54:53.264Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Plaintext vulnerability in the Gallery search module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Plaintext vulnerability in the Gallery search module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:42:56.291Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39674", "datePublished": "2024-07-25T11:42:56.291Z", "dateReserved": "2024-06-27T08:24:56.590Z", "dateUpdated": "2024-08-02T04:26:15.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42037
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42037", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T18:01:36.363093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T18:03:49.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the Graphics module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of uncaught exceptions in the Graphics module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:30:18.428Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42037", "datePublished": "2024-08-08T09:30:18.428Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-09T18:03:49.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29796
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29796", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29796", "datePublished": "2022-05-13T15:05:59", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37119", "datePublished": "2022-01-03T21:07:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39974
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39974", "datePublished": "2022-01-03T21:07:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49248
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access." } ], "value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:34:22.774Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49248", "datePublished": "2023-12-06T08:34:22.774Z", "dateReserved": "2023-11-24T07:33:47.176Z", "dateUpdated": "2024-08-02T21:53:44.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22480
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.004Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22480", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22480", "datePublished": "2022-02-25T18:11:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52375
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52375", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T17:05:15.664300Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:46.551Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the WindowManagerServices module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission control vulnerability in the WindowManagerServices module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:05:11.201Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52375", "datePublished": "2024-02-18T06:05:11.201Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48297
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48297", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52357
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52357", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T18:42:34.704872Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:32.098Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of serialization/deserialization mismatch in the vibration framework.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of serialization/deserialization mismatch in the vibration framework.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:56:01.549Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52357", "datePublished": "2024-02-18T02:56:01.549Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-08-02T22:55:41.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37015
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:22:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37015", "datePublished": "2021-11-23T15:22:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }